Anonymous Internet Banking is the proposed use of strong financial cryptography to make private, anonymous banking (or more precisely pseudonymous banking) possible. The Yodelbank is one bank that claims to be fully anonymous. ...more on Wikipedia about "Anonymous internet banking"
BlackNet was (is?) Timothy C. May's proof-of-concept construction of an information trading market where the identity of the participants and the very transactions themselves were cryptographically protected. Written as a kind of faux prospectus, and a tutorial on the uses of anonymity, the document also serves as a brief manifesto of crypto-anarchism. ...more on Wikipedia about "Blacknet"
Cipherspace is the encrypted (and often pseudonymous or fully anonymous) equivalent to cyberspace. Examples of cipherspaces include Freenet, I2P, and some anonymous mail-forwarding services. ...more on Wikipedia about "Cipherspace"
Crowds is a proposed anonymity network that gives probable innocence in the face of a large number of attackers. Crowds was designed by Michael K. Reiter and Aviel D. Rubin and defends against internal attackers and a corrupt receiver, but provides no anonymity against a global attacker or a local eavesdropper (see "Crowds: Anonymity For Web Transactions"). Crowds is vulnerable to the predecessor attack (this was discussed in Reiter and Rubin's paper and further expanded in "The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems" by Matthew K. Wright, Micah Adler, And Brian Neil Levine). Crowds is important as it introduced the concept of users blending into a crowd of computers, and many of the concepts used in newer systems (e.g. Tarzan). ...more on Wikipedia about "Crowds"
A cypherpunk anonymous remailer is an anonymous remailer that takes messages encrypted with PGP or GPG, or in some cases in plain text, and forwards it removing any identity information from the header. The message is preceded with the following pseudoheader (called "pseudoheader" because it is after the RFC 822 headers): ...more on Wikipedia about "Cypherpunk anonymous remailer"
A data haven is a computer or a network that holds data protected by both technical means ( encryption) and location in a country that has either no laws, or poorly-enforced laws against the most common uses of data havens and no extradition treaties. ...more on Wikipedia about "Data haven"
(Degree of anonymity) ; Internal/External : an internal attacker controls nodes in the network, whereas an external can only compromise communication channels between nodes. ...more on Wikipedia about "Degree of anonymity"
It's time to think about shortopedia.
The dining cryptographers protocol is a method of anonymous communication. It offers untraceability of both the sender and the recipient. ...more on Wikipedia about "Dining cryptographers protocol"
Free Haven hosts the Tor " Onion Routing" software which can make SSL transactions such as web browsing anonymous as well as the Mixminion Type III anonymous remailer. Tor has been supported both by a navy grant ** and by the Electronic Frontier Foundation. ...more on Wikipedia about "Free Haven"
Freenet is a decentralized censorship-resistant peer-to-peer distributed data store. Freenet works by pooling the contributed bandwidth and storage space of member computers to allow users to anonymously publish or retrieve various kinds of information. Freenet uses a kind of key based routing similar to a distributed hash table to locate peers' data. ...more on Wikipedia about "Freenet"
I2P is a free and open source project building an anonymous and/or pseudonymous virtual private network. The network is a simple layer that applications can use to anonymously and securely send messages to each other. ...more on Wikipedia about "I2P"
IRIS, the acronym for Infrastructure for Resilient Internet Systems, is a decentralized infrastructure using distributed hash tables that will enable large-scale distributed applications. ...more on Wikipedia about "Infrastructure for Resilient Internet Systems"
The InvisibleNet IRC Project's 'Invisible IRC proxy' (IIP) was a deniable pseudonymous IRC server, used to forward IRC connections from downstream clients in such a way that it becomes impossible for the main IRC server to determine the identity of each chatter. ...more on Wikipedia about "Invisible Internet Project"
Java Anon Proxy, also known as Java Anonymous Proxy or JAP, is a proxy system designed to allow browsing the Web anonymously. It is based in Germany and was originally developed as part of the An ongoing project of the Dresden University of Technology and Privacy Commissioner of Schleswig-Holstein. Written in the Java programming language, its slogan is Anonymity and Privacy - Anonymity is not a crime. ...more on Wikipedia about "Java Anon Proxy" Just shortopedia way
Mixmaster is an anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. Mixmaster was originally written by Lance Cottrell, and is now maintained by Len Sassaman and Peter Palfrader. Current Mixmaster software can be compiled to handle Cypherpunk messages as well; they are needed as reply blocks for nym servers. ...more on Wikipedia about "Mixmaster anonymous remailer"
Mixminion is the standard implementation of the Type III anonymous remailer protocol. Mixminion can send and receive anonymous E-mail. ...more on Wikipedia about "Mixminion"
A nym server (short for " pseudonym server") is a server that provides an untraceable e-mail address, such that neither the nym server operator nor the operators of the remailers involved can discover which nym corresponds to which real identity. ...more on Wikipedia about "Nym server"
Onion Routing is a technique for pseudonymous (or anonymous) communication over a computer network, developed by David Goldschlag, Michael Reed, and Paul Syverson. It is based on David Chaum's Mix networks, though it includes a number of advances and modifications. Among these modifications is the concept of "routing onions", which encode routing information in a set of encrypted layers. ...more on Wikipedia about "Onion Routing"
The Penet remailer (anon.penet.fi) was a pseudonymous remailer operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. It offered Internet users the ability to shield their identities when, for instance, posting messages to Usenet newsgroups. The Penet remailer was one of the first remailers, was very popular, and had a wide following. It also had some critics. ...more on Wikipedia about "Penet remailer"
A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write anonymous messages on Usenet newsgroups and send anonymous email under a pseudonym. Unlike a purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user. ...more on Wikipedia about "Pseudonymous remailer"
Tor is an implementation of second-generation onion routing - an anonymity system enabling its users to communicate anonymously on the Internet. Originally sponsored by the US Naval Research Laboratory, Tor became an Electronic Frontier Foundation (EFF) project in late 2004. The EFF supported Tor financially until November 2005 ** , and continues to provide web hosting for the project. ...more on Wikipedia about "Tor (anonymity network)"
This article is licensed under the GNU Free Documentation License.
It uses material from the Wikipedia . Direct links to the original articles are in the text.
If you use exact copy or modified of this article you should preserve above paragraph and put also : It uses material from the Shortopedia article about "Anonymity networks".
|MAIN PAGE||MAIN INDEX||CONTACT US|