Abstract
As demonstrated by the recent revelations of Edward Snowden on the extent of pervasive surveillance, one pressing danger is in the vast centralization of unencrypted messages by centralized silos such as Microsoft, Facebook, and Google. Peer-to-peer alternatives for messaging have failed to reach massive uptake amongst users. In response, we argue for a client-service federated model of messaging service providers that provide automatic encryption of messages such as email. We then present the threat model and design of LEAP, which currently provisions opportunistic email encryption combined with a VPN and cross-device synchronization. We also outline how the next steps for LEAP could allow massive deployment of mix networks and be extended to new services such as chat, file-sharing, and social networking.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
Although Tribler itself does not use encryption or anonymization techniques, but instead seems to mistakenly uphold that a peer-to-peer architecture is enough to be resistant to censorship threats.
- 3.
- 4.
- 5.
To try, follow instructions on http://demo.bitmask.net
- 6.
- 7.
Note that parts of Sects. 15.2 and 15.4 are modified versions of material available on the LEAP wiki at http://leap.se/en/docs (Accessed May 23rd 2014).
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
Note that we do understand reasonable people may disagree over the exact values, and furthermore, that we are describing only a class of deployed systems rather than particular hypothetical systems or systems that do not have mass deployment.
- 15.
For example, monitoring the patterns of communication in an IRC channel that allows anonymous identifiers can eventually reveal the identities of users of the IRC channel.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
- 26.
- 27.
TOFU stands for “Trust On First Use,” which assumes the first transfer and use of a key is not compromised.
- 28.
An Android version, with has considerable differences due to being coded in Java, is under development.
- 29.
- 30.
Such as Thunderbird, Evolution, or Outlook.
- 31.
- 32.
- 33.
References
Danezis, G., Diaz, C., Troncoso, C., Laurie, B.: Drac: An architecture for anonymous low-volume communications. In Atallah, M., Hopper, N., eds.: Privacy Enhancing Technologies. Volume 6205 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg (2010) 202–219
Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: in Proceedings of 6th Information Hiding Workshop (IH 2004. (2004) 293–308
Dingledine, R., Syverson, P.F.: Reliable mix cascade networks through reputation. In Blaze, M., ed.: Financial Cryptography. Volume 2357 of Lecture Notes in Computer Science., Springer (2002) 253–268
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Proceedings of the 13th USENIX Security Symposium 2 (2004)
Douceur, J.R.: The sybil attack. In Druschel, P., Kaashoek, M.F., Rowstron, A.I.T., eds.: IPTPS. Volume 2429 of Lecture Notes in Computer Science., Springer (2002) 251–260
Greenwald, G.: No Place to Hide: Computer Hacking, Crashing, Pirating, and Phreaking. Metropolitan Books (2014)
Gaw, S., Felten, E.W., Fernandez-Kelly, P.: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’06, New York, NY, USA, ACM (2006) 591–600
Garfinkel, S.L.: Enabling email confidentiality through the use of opportunistic encryption. In: Proceedings of the 2003 annual national conference on Digital government research. dg.o ’03, Digital Government Society of North America (2003) 1–4
Pouwelse, J.A., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, D.H.J., Reinders, M., van Steen, M.R., Sips, H.J.: Tribler: a social-based peer-to-peer system. Concurrency and Computation: Practice and Experience 20 (2008) 127–138
Whitten, A., Tygar, J.D.: Why johnny can’t encrypt: a usability evaluation of pgp 5.0. In: Proceedings of the 8th conference on USENIX Security Symposium - Volume 8. SSYM’99, Berkeley, CA, USA, USENIX Association (1999) 14–14
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Sparrow, E., Halpin, H. (2015). LEAP: The LEAP Encryption Access Project. In: Gutwirth, S., Leenes, R., de Hert, P. (eds) Reforming European Data Protection Law. Law, Governance and Technology Series(), vol 20. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9385-8_15
Download citation
DOI: https://doi.org/10.1007/978-94-017-9385-8_15
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9384-1
Online ISBN: 978-94-017-9385-8
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)