Use of Tor and other tools for anonymity has risen in popularity since the NSA leaks in 2013-14, with many users opting to hide their location for a variety of reasons. One of the earliest proposed methods for anonymity is a mix network, which leverages onion encryption. In this SIG we'll explore a few core concepts of anonymity, walk through the mix network architecture and onion encryption, and finally cover a proof of concept app that leverages mixes in AWS to publish Tweets to a anonymous Twitter account while hiding location and obfuscating the connection between user and Tweet.
Presenter: Cassandra Young, ISC
For additional information, please contact security-sig-request@lists.upenn.edu
Sponsored by Security SIG