Advertisement

Privacy-Enhancing Technologies for the Internet, II: Five Years Later

  • Ian Goldberg
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2482)

Abstract

Five years ago, “Privacy-enhancing technologies for the Internet” [23] examined the state of the then newly emerging privacy-enhancing technologies. In this survey paper, we look back at the last five years to see what has changed, what has stagnated, what has succeeded, what has failed, and why. We also look at current trends with a view towards the future.

Keywords

Federal Trade Commission Identity Theft Credit Card Number Electronic Cash Authorization Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ross Anderson. The eternity service. In Proc. Pragocrypt’ 96, pages 242–252, 1996.Google Scholar
  2. 2.
    Anonymizer.com. Online privacy services. http://www.anonymizer.com/.
  3. 3.
    Associated Press. Napster settles with Metallica. Wired News, 12 July 2001.Google Scholar
  4. 4.
    Adam Back. The eternity service. Phrack Magazine, 7(51), 1 September 1997.Google Scholar
  5. 5.
    Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). In Security Protocols Workshop, pages 59–63, 1998.Google Scholar
  6. 6.
    Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom Systems 2.0 Architecture. http://www.freedom.net/products/whitepapers/FreedomSystem2Architecture.pdf, December 2000.
  7. 7.
    Stefan Brands. Rethinking Public Key Infrastructure and Digital Certificates —Building in Privacy. MIT Press, 2000.Google Scholar
  8. 8.
    Bundesministerium für Bildung, Wissenschaft, Forschung und Technologie. Act on the Protection of Personal Data Used in Teleservices (Teleservices Data Protection Act —Teledienstedatenschutzgesetz TDDSG). Federal Law Gazette I, page 1870, 1997. http://www.datenschutz-berlin.de/recht/de/rv/tkmed/iukdgen.htm#a2.
  9. 9.
    David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, Proc. Crypto’ 82. Plenum Press, 1983.Google Scholar
  10. 10.
    Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46–66, 2000.Google Scholar
  11. 11.
    Computer Cryptology. Apas anonymous remailer use. http://www.faqs.org/faqs/privacy/anon-server/faq/use/part3/section-3.html, 2 December 2001.
  12. 12.
    Wei Dai. Pipenet. http://www.eskimo.com/~weidai/pipenet.txt, February 1995. Post to the cypherpunks mailing list.
  13. 13.
    Michelle Delio. MS TV: It’ll Be Watching You. Wired News, 11 December 2001.Google Scholar
  14. 14.
    Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Un-observability, pages 67–95, 2000.Google Scholar
  15. 15.
    eBay, Inc. The world’s online marketplace. http://www.ebay.com/.
  16. 16.
    European Communities. Data Protection. http://europa.eu.int/comm/intern almarket/en/dataprot/law/.
  17. 17.
    David Farley. Doctor fun. http://www.ibiblio.org/Dave/Dr-Fun/df9601/df960124.jpg, 24 January 1996.
  18. 18.
    FastTrack. P2P Technology. http://www.fasttrack.nu/.
  19. 19.
    Federal Trade Commission. Children’s Online Privacy Protection Act of 1998. http://www.ftc.gov/opa/1999/9910/childfinal.htm.
  20. 20.
    Federal Trade Commission. Gramm-Leach-Bliley Act. http://www.ftc.gov/privacy/glbact/.
  21. 21.
    Hannes Federrath. JAP —Anonymity & Privacy. http://anon.inf.tu-dresden.de/indexen.html.
  22. 22.
    Gnutella News. Welcome to Gnutella. http://gnutella.wego.com/.
  23. 23.
    Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the Internet. In Proceedings of IEEE COMPCON’ 97, 1997.Google Scholar
  24. 24.
    David Goldshlag, Michael Reed, and Paul Syverson. Hiding routing information. In Information Hiding, First International Workshop, pages 137–150, May 1996.Google Scholar
  25. 25.
    David Goldshlag, Michael Reed, and Paul Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2), February 1999.Google Scholar
  26. 26.
    Google. Google groups. http://groups.google.com/.
  27. 27.
    Health Care Financing Administration. HIPAA Welcome Page. http://www.hcfa.gov/medicaid/hipaa/default.asp.
  28. 28.
    Johan Helsingius. Johan helsingius closes his internet remailer. http://www.cyberpass.net/security/penet.press-release.html, 30 August 1996.
  29. 29.
    IBM Corporation. Tivoli Security Products. http://www.tivoli.com/products/solutions/security/products.html.
  30. 30.
    The Internet Archive. Wayback machine. http://web.archive.org/.
  31. 31.
    InterTrust Technologies Corporation. InterTrust Strategic Technologies and Architectural Research Laboratory. http://www.star-lab.com/.
  32. 32.
    Junkbusters Corporation. Internet Junkbuster Headlines. http://internet.junkbuster.com/ijb.html.
  33. 33.
    David Kristol and Lou Montulli. HTTP State Management Mechanism, October 2000. RFC 2965.Google Scholar
  34. 34.
    Lawrence Lessig. Code and Other Laws of Cyberspace. Basic Books, 1999.Google Scholar
  35. 35.
    Raph Levien. Advogato’s trust metric. http://www.advogato.org/trust-metric.html.
  36. 36.
    David Maziéres and M. Frans Kaashoek. The design, implementation and operation of an email pseudonym server. In Proc. 5th ACM Conference on Computer and Communications Security, pages 27–36. ACM Press, November 1998.Google Scholar
  37. 37.
    Microsoft Corporation. Microsoft.NET. http://microsoft.com/net/whatis.asp.
  38. 38.
    Napster, Inc. Napster. http://www.napster.com/.
  39. 39.
    Open Source Development Network. Slashdot: News for nerds, stuff that matters. http://slashdot.org/.
  40. 40.
  41. 41.
    Privacy Commissioner of Canada. The Personal Information Protection and Electronic Documents Act. http://www.privcom.gc.ca/legislation/020601e.asp
  42. 42.
    Joseph Reagle and Lorrie Faith Cranor. The Platform for Privacy Preferences. Communications of the ACM, 42(2):48–55, February 1999.Google Scholar
  43. 43.
    Michael Reiter and Avi Rubin. Anonymous web transactions with crowds. Communications of the ACM, 42(2):32–48, February 1999.Google Scholar
  44. 44.
    SafeWeb. Safeweb startpage. https://www.safeweb.com/.
  45. 45.
    Len Sassaman and Ulf Möller. Mixmaster. http://sourceforge.net/projects/mixmaster/.
  46. 46.
    Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, November 1979.Google Scholar
  47. 47.
    Sun Microsystems, Inc. Liberty Alliance. http://www.projectliberty.org/.
  48. 48.
    U.S. Department of Justice. Identity theft and fraud. http://www.usdoj.gov/criminal/fraud/idtheft.html, 5 June 2000.
  49. 49.
    Marc Waldman, Avi Rubin, and Lorrie Faith Cranor. Publius: a robust, tamper-evident, censorship-resistant and source-anonymous web publishing system. In Proc. 9th Usenix Security Symposium, pages 59–72, August 2000.Google Scholar
  50. 50.
    Zero-Knowledge Systems, Inc. Enterprise Solutions. http://www.zeroknowledge.com/business/.
  51. 51.
    Zero-Knowledge Systems, Inc. Freedom WebSecure. http://www.freedom.net/products/websecure/.

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Ian Goldberg
    • 1
  1. 1.Zero-Knowledge Systems, Inc.USA

Personalised recommendations