5,164 research outputs found

    Hang With Your Buddies to Resist Intersection Attacks

    Full text link
    Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other but not to the sender - but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for intersection attack resistance in practical anonymity systems. Buddies groups users dynamically into buddy sets, controlling message transmission to make buddies within a set behaviorally indistinguishable under traffic analysis. To manage the inevitable tradeoffs between anonymity guarantees and communication responsiveness, Buddies enables users to select independent attack mitigation policies for each pseudonym. Using trace-based simulations and a working prototype, we find that Buddies can guarantee non-trivial anonymity set sizes in realistic chat/microblogging scenarios, for both short-lived and long-lived pseudonyms.Comment: 15 pages, 8 figure

    Vote Buying

    Get PDF
    We examine the consequences of vote buying, assuming this practice were allowed and free of stigma. Two parties competing in a binary election may purchase votes in a sequential bidding game via up-front binding payments and/or campaign promises (platforms) that are contingent upon the outcome of the election. We analyze the role of the parties' budget constraints and voter preferences in determining the winner and the payments to voters.vote buying, elections, campaign promises
    corecore