Title :
Camouflaged Private Communication
Author :
Herzberg, Amir ; Porat, Ely ; Soffer, Nir ; Waisbard, Erez
Author_Institution :
Dept. of Comput. Sci., Bar-Ilan Univ., Ramat-Gan, Israel
Abstract :
Communication such as web browsing is often monitored and restricted by organizations and governments. Users who wish to bypass the monitoring and restrictions often relay their (encrypted) communication via proxy servers or anonym zing networks such as Tor. While this type of solution allows users to hide the content of their communication and often bypass the restrictions, the mere use of a proxy may alert authorities, placing the users at risk. We introduce a simple and efficient construction, leveraging general purpose services, which allows users to hide their communication from active adversaries without relying on prior trust. Finally, we implement a proof of concept showing that camouflaged web browsing is possible using legitimate services such as Gmail without requiring software installation on the client side.
Keywords :
computer mediated communication; cryptography; data privacy; Gmail; Tor; Web browsing; anonymizing networks; camouflaged private communication; encrypted communication; general purpose services; proxy servers; Cryptography; Electronic mail; IP networks; Monitoring; Servers; Software; Anonymity; Private Browsing; Security;
Conference_Titel :
Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4577-1931-8
DOI :
10.1109/PASSAT/SocialCom.2011.104