Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Choosing Your Friends: Shaping Ethical Use of Anonymity Networks

  • Conference paper
  • First Online:
Security Protocols XXVIII (Security Protocols 2023)

Abstract

Anonymity networks protect the metadata of communication between participants. This is an important privacy guarantee for whistleblowers, activists, journalists and others who rely on anonymity networks. However, these same guarantees can also help criminals and disruptive users evade the consequences of their actions. Existing literature and research has little to say on what designers and operators of such networks can do to maximize beneficial uses while minimizing harm. We build on lessons learned from the widespread deployment of another strong privacy technology, end-to-end encrypted messaging applications, as well as on existing examples from anonymity networks, to formulate a set of design methods which anonymity networks can use to discourage harmful use. We find better solutions exist when networks are specialized to particular application domains since such networks are then able to provide a better trade-off between benefits and harms. One drawback of such specialization is that it may lead to smaller numbers of users and therefore an increased risk of insufficient anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahmed-Rengers, M., Vasile, D.A., Hugenroth, D., Beresford, A.R., Anderson, R.: Coverdrop: Blowing the whistle through a news app. In: Proceedings on Privacy Enhancing Technologies, vol. 2022 (2), 47–67 (2022)

    Google Scholar 

  2. Bodle, R.: The ethics of online anonymity or Zuckerberg vs. Moot. ACM SIGCAS Comput. Soc. 43(1), 22–35 (2013)

    Article  Google Scholar 

  3. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  4. Christin, N.: Traveling the Silk Road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 213–224 (2013)

    Google Scholar 

  5. Danezis, G., Anderson, R.: The economics of resisting censorship. IEEE Secur. Priv. 3(1), 45–50 (2005)

    Article  Google Scholar 

  6. Di Salvo, P.: Securing whistleblowing in the digital age: SecureDrop and the changing journalistic practices for source protection. Digit. J. 9(4), 443–460 (2021)

    Google Scholar 

  7. Diaz, C., Halpin, H., Kiayias, A.: The Nym Network. Whitepaper (2021)

    Google Scholar 

  8. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Tech. rep, Naval Research Lab Washington DC (2004)

    Google Scholar 

  9. Europol, Eurojust: dismantling of an encrypted network sends shockwaves through organised crime groups across Europe (2020). https://www.europol.europa.eu/media-press/newsroom/news/dismantling-of-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe. Accessed Jan (2023)

  10. Federal Bureau of Investigation: international criminal communication service dismantled (2018). https://www.fbi.gov/news/stories/phantom-secure-takedown-031618. Accessed Jan (2023)

  11. Gotterbarn, D., Miller, K., Rogerson, S.: Software engineering code of ethics is approved. Commun. ACM 42(10), 102–107 (1999)

    Article  Google Scholar 

  12. Hern, A.: Instagram led users to Covid misinformation amid pandemic - report. The Guardian (2021). https://www.theguardian.com/technology/2021/mar/09/instagram-led-users-to-covid-misinformation-amid-pandemic-report. Accessed Jan (2023)

  13. Hern, A., Safi, M.: WhatsApp puts limit on message forwarding to fight fake news. The Guardian (2019). https://www.theguardian.com/technology/2019/jan/21/whatsapp-limits-message-forwarding-fight-fake-news. Accessed Jan (2023)

  14. JAP Team: Project: AN.ON - anonymity.online (2011). https://anon.inf.tu-dresden.de/index_en.html. Accessed Jan (2023)

  15. Jardine, E., Lindner, A.M., Owenson, G.: The potential harms of the tor anonymity network cluster disproportionately in free countries. Proc. Natl. Acad. Sci. 117(50), 31716–31721 (2020)

    Article  Google Scholar 

  16. Paul, K.: We risk another crisis: TikTok in danger of being major vector of election misinformation. The Guardian (2022). https://www.theguardian.com/technology/2022/oct/24/tiktok-election-misinformation-voting-politics. Accessed Jan (2023)

  17. Piotrowska, A.M., Hayes, J., Elahi, T., Meiser, S., Danezis, G.: The Loopix anonymity system. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1199–1216 (2017)

    Google Scholar 

  18. Rogaway, P.: The moral character of cryptographic work. Cryptology ePrint Archive (2015)

    Google Scholar 

  19. The Economist: how social-media platforms dispense justice. The Economist (2018). https://web.archive.org/web/20190516115755/, https://www.economist.com/business/2018/09/06/how-social-media-platforms-dispense-justice. Accessed Jan (2023)

  20. Tor Project: Abuse FAQ - Doesn’t Tor enable criminals to do bad things? (2023). https://support.torproject.org/abuse/what-about-criminals/. Accessed Feb. (2023)

  21. Zantout, B., et al.: I2P data communication system. In: Proceedings of ICN, pp. 401–409. Citeseer (2011)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank Laura Bechthold and Jenny Blessing for interesting discussions and valuable feedback before the workshop. In addition, the authors would like to thank all workshop participants whose questions and input helped shape this revised paper version. Daniel Hugenroth is supported by Nokia Bell Labs and the Cambridge Trust. Ceren Kocaoğullar is supported by King’s College Cambridge and the Cambridge Trust.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Hugenroth .

Editor information

Editors and Affiliations

Appendices

A The Tor FAQ Entry

The following is a full quote from the Abuse FAQ of the Tor project [20] retrieved on 14th February 2023.

Doesn’t Tor enable criminals to do bad things?

Criminals can already do bad things. Since they’re willing to break laws, they already have lots of options available that provide better privacy than Tor provides. They can steal cell phones, use them, and throw them in a ditch; they can crack into computers in Korea or Brazil and use them to launch abusive activities; they can use spyware, viruses, and other techniques to take control of literally millions of Windows machines around the world.

Tor aims to provide protection for ordinary people who want to follow the law. Only criminals have privacy right now, and we need to fix that.

Some advocates of anonymity explain that it’s just a tradeoff - accepting the bad uses for the good ones - but there’s more to it than that. Criminals and other bad people have the motivation to learn how to get good anonymity, and many have the motivation to pay well to achieve it. Being able to steal and reuse the identities of innocent victims (identity theft) makes it even easier. Normal people, on the other hand, don’t have the time or money to spend figuring out how to get privacy online. This is the worst of all possible worlds.

So yes, criminals can use Tor, but they already have better options, and it seems unlikely that taking Tor away from the world will stop them from doing their bad things. At the same time, Tor and other privacy measures can fight identity theft, physical crimes like stalking, and so on.

B Playing Cards

In the workshop we presented the design choices as playing cards. These are included below to serve as reference as they are mentioned in the transcribed discussion. We used OpenAI’s DALL\(\cdot \)E for generating illustrative images.

figure a
figure b

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hugenroth, D., Kocaoğullar, C., Beresford, A.R. (2023). Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. In: Stajano, F., Matyáš, V., Christianson, B., Anderson, J. (eds) Security Protocols XXVIII. Security Protocols 2023. Lecture Notes in Computer Science, vol 14186. Springer, Cham. https://doi.org/10.1007/978-3-031-43033-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-43033-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-43032-9

  • Online ISBN: 978-3-031-43033-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics