AfonsoVilalonga / TorKameleon

A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels and K-anonymization.
10 stars 0 forks source link

Hello, I would like to ask how TorKameleon proxy works #1

Open narutoxc opened 5 months ago

narutoxc commented 5 months ago

Hello, after reading your paper and this project, I did not understand how TorKameleon proxy achieves user K-anonymity. I read Tork and Tir mentioned in your paper. These two schemes basically confuse the identities of K users, reducing the attacker's identification rate to 1/K. But in this solution, why can k-anonymity be achieved by connecting to TorKameleon proxy? I want to know the answer to this, can you answer it for me, thank you.

AfonsoVilalonga commented 5 months ago

Hi!

I am more than glad to answer and thank you for showing interest in this project.

The main idea behind this concept is similar to what TorK (or BriK as it is now called) and Tir do. Connecting to a single proxy would not provide K anonymity, but having K proxies interconnected in a network with K users sending similar traffic at the same time, and/or having the proxies send chaff traffic alongside the legitimate traffic, would give plausible deniability to any individual user that the outgoing traffic is originally sent by them and not by any of the remaining K-1 users. At least, this is the idea.

Now, that aspect of our work still needs some more testing and work, since we do not automate this grouping of users and it is something that we are currently looking into. We later divided this into two avenues of work, one related to the primary focus (the WebRTC encapsulation methodology) and a second for the multipath routing and K-anonymity solution.

Our main objective with this work was to create an easily deployable solution that utilizes WebRTC media streaming-based encapsulation. This solution could be deployed either as a pluggable transport within the Tor network or as a standalone tool. We also ported the media streaming-based encapsulation methodology of TorKameleon to a Go-based tool, leveraging the pion WebRTC framework. This tool is currently in a private repository, but we plan to make it public after some more testing. This Go-based tool is more easily deployed than the Java one and can serve as a standalone solution, where a client connects to a TorKameleon proxy using a WebRTC media stream as the carrier for data or as a pluggable transport for the Tor network.