Jump to content

Surf the internet anonymously and unobservably with JAP JonDo.


majithia23

Recommended Posts

Protection of Privacy on the Internet

jap.gifJAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably.

JAP is a software development within the Project Anonymity in the Internet sponsored by the German Research Foundation and the Federal Ministry of Economics and Technology. The Project works closely with the Independent Center for Data Privacy Schleswig-Holstein. You can learn more about data privacy at the Virtual Data Privacy Office.

What is JonDo?

The JonDonym/AN.ON technology is based on the principle of multiple (layered) encryption, distribution and processing. This procedure does not only protect your Internet activities from being observed by third parties (against your access provider, WLAN hackers, advertising services and websites), but also against observation by the individual JonDonym providers themselves (against JonDonym service operators and their billing providers).

  • JonDo is an application that spoofs your own IP address for Internet access using certain applications (e.g. by the web browser).
  • JonDo multiply encrypts the data sent over JonDonym. Neither your access provider nor JonDonym operators (except for the last mix one in each cascade) can see your plaintext data.
  • JonDo is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Users may configure their JonDo as aforwarding server in order to allow others access to the JonDonym service.
  • JonDo is open source and free. The program offers access to both free and paid (premium) services.
  • JonDo filters and anonymizes HTTP headers – but only for unencrypted connections (not HTTPS). You should additionally use JonDoFox in order to also filter encrypted connections.
  • JonDo is available on all major systems (Windows, Mac OS X, Linux).
  • JonDo was and is developed by the JonDos GmbH in cooperation with German universities (TU Dresden, Universität Regensburg) and privacy organizations (Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein).

How it works

jondonym2.png

Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.

Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user. A relationship between a connection and its user could only be determined if all intermediaries worked together to sabotage the anonymization. more...

The intermediaries (mix providers) are generally provided by independent institutions which officially declare, that they do not keep connection log files or exchange such data with other mix providers. JAP shows the identity and number of organisations in each Mix cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades.

Developers ---

Project Leadership

Mix server operation contact

University of Regensburg, Department of Business Informatics

Chair Management of Information Security

Prof. Dr. Hannes Federrath

D-93040 RegensburgTechnical University Dresden, Institute for System Architecture

Chair of Privacy and Data Security

Stefan Köpsell

D-01062 Dresden

Download JonDo latest client

JAP Anonymity home page

Link to comment
Share on other sites


  • Replies 3
  • Views 2.6k
  • Created
  • Last Reply

[interesting. it would require a back door on the system then to the government to do its thing???

Link to comment
Share on other sites


[interesting. it would require a back door on the system then to the government to do its thing???

it doesnt require a back door to any server ( by government or any individual ) , because , this is what the developer says about the service ---

"The anonymization service JonDonym is a development branch of the AN.ON Project. It consists of multiple user selectable mix cascades. A cascade consists of two or three separately encrypted mix servers. These mix servers are operated by independent and non interrelated organizations or private individuals who all publish their identity . in JonDonym only certified and publicized persons and organizations may operate a mix server. The operators have to abide by strict provisions which prohibit saving connection data or exchanging such data with other operators. Every connection from a user is differently encrypted for every mix server within a cascade and transferred through the cascade to the target "

its features as outlined by the developers --

Protection against your own Internet access provider

Protection against the anonymity service operators

No logfiles

Transparent functionality

No software backdoor

Secure browser profile

Portable anonymity

Easy combination with other products

Evolution by research

Competent, fast and at no charge

on comparison with TOR network , this is what they put ---

A similar anonymization can only be offered by the non-commercial software Tor. While the Tor hidden services (a special Tor feature) are somewhat affected, the Tor users themselves are also protected against TCP timestamp attacks similar to JonDonym. Internet beginners should be careful with Tor, though: there is no control over who runs the Tor servers over which your private data travels. In the past, there has been ongoing suspicion that criminals and intelligence agencies exploit the Tor network in order to secretly attain unencrypted information like passwords, bank accounts and credit cards. Moreover, certain tricks can enable the Tor server to concentrate much of the traffic on itself, making the exploit even more effective. Tor may be set as proxy in JonDo though, making surfing considerably slower but, in some individual cases, even more secure than with JonDonym alone: thereby the last servers in this chain will then be part of the verified JonDonym network.

Like in Tor, the respective last mix server in a JonDonym cascade could record data which is not separately secured by HTTPS/SSL (this has to be offered by the web site itself). Unlike Tor and other services, however, in JonDonym only certified and publicized persons and organizations may operate a mix server. The user may then decide for himself on whether he trusts the operator or not. If needed, they may simply choose other operators. All this makes it highly improbable for criminal operators to infiltrate JonDonym.

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...