hashcloak / research

Notes around current, public research projects
4 stars 2 forks source link

Readings for Validator Privacy #3

Open chloethedev opened 4 years ago

chloethedev commented 4 years ago

Chapters 1, 2, 6 of Threat Modeling

chloethedev commented 4 years ago

Link for Hack MD: https://hackmd.io/BBBg1YxHRU6GEhfbkzYIbg

Working on "All ethresear.ch posts related to validator privacy"

chloethedev commented 4 years ago

Went through the obvious posts on ethresear.ch that centered around "Validator Privacy": https://hackmd.io/BBBg1YxHRU6GEhfbkzYIbg

Started on the first paper here: https://hackmd.io/TPh4pjikQE-_RNqMsqBRRQ

chloethedev commented 4 years ago

Starting with SSLE paper. Link @ https://hackmd.io/BNBb2U39Rx6E-iRwVGox6A

chloethedev commented 4 years ago

Moving on to https://hackmd.io/k08e0MMYRIuRwHHtCWFOXQ.

chloethedev commented 3 years ago

Started working on "Rumors in a Network: Who's the culprit?" Notes are available at: https://hackmd.io/gM7FXo4bQi2KVS9C_yvtbA?edit

chloethedev commented 3 years ago

https://www.freehaven.net/anonbib/cache/george-thesis.pdf seems to be the same as https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-594.pdf. Could be wrong, remember to ask.

Mikerah commented 3 years ago

@chloethedev Nope, they are different. One is Danezis's master's thesis and the other his PhD thesis. There's overlapping content though.

Mikerah commented 3 years ago

Actually, both seem to be his PhD thesis but one is more of a technical report. There's overlapping content in both. Just read the whichever one is easiest.

chloethedev commented 3 years ago

Actually, both seem to be his PhD thesis but one is more of a technical report. There's overlapping content in both. Just read the whichever one is easiest.

One of them, https://www.freehaven.net/anonbib/cache/george-thesis.pdf, did not show up well on my browser so I went through the technical report which I noted in the notes. Thank you for the response.

chloethedev commented 3 years ago

Finished with the Whisper paper at https://hackmd.io/0NyMktZyQx-sr8w-uxo25w?view

chloethedev commented 3 years ago

Complete: https://hackmd.io/H3eDeCedQwyf9LWssDK_dw?view

chloethedev commented 3 years ago

Starting: https://hackmd.io/LNdM-ijfQ1i9Z9Zl38PHgg?view

chloethedev commented 3 years ago

Completed https://hackmd.io/hOyMGL33SNWbQC8AJRkicQ?view Setting up https://hackmd.io/89aDiXZ8RXODmzeR756sQg?view for Monday.

chloethedev commented 3 years ago
  1. Validator Privacy Notes from ETHresear.ch: https://hackmd.io/BBBg1YxHRU6GEhfbkzYIbg
  2. Summary of Designing for Security - Adam Shostack CH - 1,2,6: https://hackmd.io/TPh4pjikQE-_RNqMsqBRRQ
  3. Design and analysis methods for privacy technologies - Carmela Troncoso 2011: https://hackmd.io/k08e0MMYRIuRwHHtCWFOXQ
  4. Rumors in a Network: Who’s the culprit? - 2011: https://hackmd.io/gM7FXo4bQi2KVS9C_yvtbA
  5. Designing and attacking anonymous communication systems - George Danezis 2004: https://hackmd.io/lAN4_-nCTyWzftOb05fbYw
  6. Not all is lost for anonymity – but quite a lot is. - 2019: https://hackmd.io/QTsKIjBeRbGTwYEtSYV-oQ?view
  7. Challenges in deploying low-latency anonymity (DRAFT): https://hackmd.io/hOyMGL33SNWbQC8AJRkicQ
  8. Weak Subjectivity in Eth2.0 - 2020: https://hackmd.io/nk4zhjcLSWO6URS9z5Ux_w
  9. The Economics of Censorship Resistance: https://hackmd.io/LNdM-ijfQ1i9Z9Zl38PHgg
  10. Whisper: https://hackmd.io/0NyMktZyQx-sr8w-uxo25w
  11. An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks: https://hackmd.io/H3eDeCedQwyf9LWssDK_dw
  12. BYZANTINE ATTACKS ON ANONYMITY SYSTEMS - 2005: https://hackmd.io/mE_-BJ2WQf2JLrn73gbeJA
  13. Secret Leader Election: https://hackmd.io/BNBb2U39Rx6E-iRwVGox6A
  14. On Privacy Notions in Anonymous Communication - 2019: https://hackmd.io/89aDiXZ8RXODmzeR756sQg
  15. Compulsion Resistant Anonymous Communications: https://hackmd.io/nexCkSZGREiNzR0xPCumYA?view
  16. On the Economics of Anonymity: https://hackmd.io/YKg4qh_0RYiO65OKk5sUBw?view
  17. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection: https://hackmd.io/2_RlHuUGSjyKYLJdxmyTfg?view
  18. Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks: https://hackmd.io/yYvAhne_RFSkoDIbRFQWmA?view
  19. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks: https://hackmd.io/LzdR0zH8TAm-au3lGkhqJQ?view
  20. Hashing it out in public: https://hackmd.io/ELqpWt-qTvWgTX-PZ9dMbg?view
  21. Video: DEFCON 16: Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol: https://hackmd.io/bfijThaDSjWiSYnM44d5SQ?view