slide1
Download
Skip this Video
Download Presentation
Reinventing Digital Identity

Loading in 2 Seconds...

play fullscreen
1 / 21

Reinventing Digital Identity - PowerPoint PPT Presentation


  • 291 Views
  • Uploaded on

Reinventing Digital Identity . Design Goals Product Overview Technology & Cryptography Overview Question & Answer. Design Philosophy. Authenticated, secure communications are GOOD . Government & 3rd-party Certificate Authorities that force ‘True Identity’ certificates are BAD .

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Reinventing Digital Identity' - medwin


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
reinventing digital identity
Reinventing Digital Identity
  • Design Goals
  • Product Overview
  • Technology & Cryptography Overview
  • Question & Answer
design philosophy
Design Philosophy
  • Authenticated, secure communicationsare GOOD.
  • Government & 3rd-party Certificate Authorities that force ‘True Identity’ certificates are BAD.
  • Pseudonymous certificates are GOOD.
design goals
Design Goals
  • Persistent, cryptographically-assured pseudonyms.
  • Full strength cryptography with no key escrow. Nobody knows your true identity.
  • Completely pseudonymous system architecture for total privacy protection.
design problems
Design Problems
  • Distributed anonymous system for technical security.
  • Distributed anonymous system for protection against legal/legislative attacks.
  • Technical requirements for total anonymity requires Anonymous IP protocol.
freedom server
Freedom Server
  • Freedom Servers are Anonymous Internet Proxies
  • The Freedom server network carries all Anonymous IP traffic.
  • Distributed without charge to Freedom Network operators.
  • Freedom network operators are part of a revenue sharing program.
freedom server features
Support Internet Freedom

Protect users’ privacy

Market your Internet services as ‘Privacy enhanced’

Value-added for ISP customers

Reduce liability and abuse handling associated with users’ actions

EARN REVENUE$ !

Freedom Server Features
freedom server technical details
Freedom Server: Technical Details
  • Freedom Server currently operates on Solaris 2.6 & Linux 2.1
  • Suggested bandwidth requirement:256Kbps (~1/5 of a T1) minimum.
  • Configurable bandwidth-shapingmanages the Freedom network’s bandwidth usage.
freedom the client
“Freedom” (the Client)
  • Freedom allows for completely anonymous:
  • E-mail (bi-directional pseudonymous e-mail is supported)
  • Usenet News (Pseudonymous news reading and posting)
  • Web browsing (Completely pseudonymous web browsing)
  • IRC (Anonymous IRC chat, DCC is not supported in this version)
  • Anonymous SSH Login
  • Anonymous Telnet & DNS
freedom client con t
“Freedom” Client (con’t)
  • Client creates multiple pseudonyms in the form of ‘[email protected]’.
  • Client allows users to associate any action with a specific pseudonym.
freedom client con t12
“Freedom” Client (con’t)
  • Encryption and pseudonym handling is fully transparent to Users.
  • Client will initially be available for Windows & Linux in Q1/99
  • Macintosh client available Q2/99.
  • Testing begins in December, if you register at the website now!
technology cryptography overview
Technology & CryptographyOverview
  • Review of Anonymous IP
  • Review of Digital Identity
  • Review of System Cryptography
the anonymous cloud
The Anonymous Cloud

1. Client sets up anonymous route and negotiates keys with servers.

2. The first server removes one layer of encryption.

3. The next server removes a layer of encryption.

4. The final hop removes the last layer of encryption and forwards the traffic to the final destination. Traffic returning through the tunnel has data encrypted in reverse with the client removing all the layers of encryption.

anonymous ip
Anonymous IP
  • Dynamic anonymous route creation through multiply-encrypted server hops.
  • Route selection is fully configurable,or selected automatically.
  • All Anonymous IP servers have padded links to each other with cover traffic to protect against traffic analysis.
pseudonymous digital identity
Pseudonymous Digital Identity
  • Your Digital Identity is comprised of the following elements:
    • Pseudonym (Name + PGP DSS sig.)
    • Public Key(PGP DH v5.5.5-compatible)
    • Multiple Reply Blocks
    • Vital Statistics
review of system cryptography
Review of System Cryptography
  • Freedom Servers & Clients are exportable to all countries in the world except the seven terrorist nations named in the Wassenaar Arrangements.
  • The system uses no key escrowor key recovery techniques!
  • Freedom is for Everyone, regardless of their government (features backbone attack-resistance).
review of system cryptography19
Review of System Cryptography
  • Freedom uses the SSLeay cryptography libraries with Blowfish for symmetric encryption and DSS/DH for public key encryption.
  • Freedom’s architecture & cryptography will be independently audited by Counterpane Systems (Bruce Schneier).
general product info
General Product Info
  • Client software is available in two versions: “Light” (free) & “Pro” (~$50-65, plus <$10 annual fee per pseudonym).
  • Light version includes E-mail, Usenet and low-priority web browsing. Also includes one (1) numeric pseudonym.
  • Pro version adds IRC, Telnet, SSH andfive (5) user-defined pseudonyms.
for more information visit
For More Information, visit...
  • http://www.freedom.net
ad