• Subscriber/Sign In
  • Register
  • About Us
isssource.com
  • Home
  • Register
  • News
    • Careers
    • Government
    • Incidents
    • Industry Voices
    • Products and Services
    • Sending it Your Way
    • Technology Update
    • Views
  • Research
  • Events
  • Login
  • Lost Password
  • Training & Certification
  • White Papers
  • Subscribe Now
  • Archives

Breaking News

  • Siemens Mitigation Plan for Simatic App
  • Chemicals Leak at DE Refinery
  • Microsoft Engineer Charged with Money Laundering
  • Schneider Software Plan for InduSoft, InTouch Hole
  • Schneider Updates its Triconex Tricon
  • Rockwell Plan on Stratix Services Router Fix
  • Rockwell Updates Stratix, ArmorStratix Switches
  • Rockwell Mitigation Plan for Ethernet Switch
  • U.S., UK OT Alert on Russians Hackers
  • PAS: Safety System Attack Preventable
  • Balchem Feeds off SHARP
  • Cybersecurity Framework Version 1.1 Released
  • New Alloy Boosts Nuclear Safety
  • Moxa Clears Router Holes
  • 3 Injured in Blast at MN 3M Plant
  • Yokogawa’s Mitigations for CENTUM, Exaopc Hole
  • Read More

Chemical Safety Incidents

White Papers

  • A Year in Vulnerabilities
  • A Year in Threats
  • Year in Hunting and Responding
  • Finding the Competitive Edge
  • Going Digital
  • Visibility Leads to Knowledge
  • Tips to SCADA Security
  • Read More

Sending it Your Way

  • exida Explains
  • ABB: Process Automation Insights
  • Joel Langill: SCADAhacker
  • [In] Security Culture
  • Eric Byres: Practical SCADA Security
  • Department of Homeland Security
  • Jim Cahill
  • Dale Peterson
  • Industrial Defender
  • Wurldtech
  • Read More

Untraceable Messaging System

Monday, December 14, 2015 @ 03:12 PM gHale

There is now an effective and scalable text-messaging system in development that can guarantee user anonymity.

Vuvuzela can achieve this by drowning out traffic made by users with bogus traffic, i.e. hiding metadata from adversaries. It also hides the messages’ content by encrypting it, said researchers at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL).

RELATED STORIES
New Path for Secure Communications
Automating Big Data Analysis
Hybrid Space Engine Saves Time, Energy
New Technique Hikes Hydrogen Production

“Vuvuzela aims to provide point-to-point messaging between users in a way that is private in the face of a strong adversary, who can observe and tamper with the entire network and all but one of Vuvuzela’s servers,” the researchers said. “That is, an adversary should not be able to distinguish between a scenario where two particular users are communicating, and a scenario where they are not, even after interfering with the system.”

Vuvuzela got its name from the infamous plastic stadium horn.

When compared to other similar systems like Dissent (offers privacy, but it’s not very scalable) and Tor (is scalable, but assumes that no single bad guy controls a large number of nodes in their system — an assumption that can no longer be counted on in this era of pervasive network monitoring), the scientists believe that Vuvuzela comes out ahead.

“Vuvuzela’s key insight is to minimize the number of variables observable by an attacker, and to use differential privacy techniques to add noise to all observable variables in a way that provably hides information about which users are communicating,” they said.

Vuvuzela’s privacy guarantees can end up kind of like “plausible deniability,” the researchers said.

“Each time a user sends a message in Vuvuzela, an adversary may be able to infer a small amount of statistical information — e.g., based on what the adversary observed, it seems a bit more likely that Alice and Bob were talking. However, Vuvuzela ensures that even the total information, over many messages exchanged by a user, still provides a strong level of differential privacy,” the researchers said.

More details about how the system works are in this paper, and on the project’s GitHub page.

In tests, the scientists discovered the system can support 1 million users, with an end-to-end latency of 37 seconds, achieving a throughput of 68,000 messages per second. “Scaling up to 2 million users increases the latency from 37 to 55 seconds,” they said, which is still not that bad if you want guaranteed anonymity.



Leave a Reply

Click here to cancel reply.

You must be logged in to post a comment.

« Data Recorders Vulnerable
Backdoor Undetected, Until Now »

  • Home
  • Register
  • View Spotlight Article
  • News
  • Research
  • Events
  • Login
  • Lost Password
  • Training & Certification
  • White Papers
  • Subscribe Now
  • About Us
  • Archive
  • Sitemap
  • Careers
  • Government
  • Incidents
  • Industry Voices
  • Products and Services
  • Sending it Your Way
  • Technology Update
  • Views
Policies
Copyright © 2018 isssource.com
Powered by Magic Members Membership Software