majithia23 Posted March 13, 2011 Share Posted March 13, 2011 Protection of Privacy on the InternetJAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably. JAP is a software development within the Project Anonymity in the Internet sponsored by the German Research Foundation and the Federal Ministry of Economics and Technology. The Project works closely with the Independent Center for Data Privacy Schleswig-Holstein. You can learn more about data privacy at the Virtual Data Privacy Office. What is JonDo?The JonDonym/AN.ON technology is based on the principle of multiple (layered) encryption, distribution and processing. This procedure does not only protect your Internet activities from being observed by third parties (against your access provider, WLAN hackers, advertising services and websites), but also against observation by the individual JonDonym providers themselves (against JonDonym service operators and their billing providers).JonDo is an application that spoofs your own IP address for Internet access using certain applications (e.g. by the web browser).JonDo multiply encrypts the data sent over JonDonym. Neither your access provider nor JonDonym operators (except for the last mix one in each cascade) can see your plaintext data.JonDo is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Users may configure their JonDo as aforwarding server in order to allow others access to the JonDonym service.JonDo is open source and free. The program offers access to both free and paid (premium) services.JonDo filters and anonymizes HTTP headers – but only for unencrypted connections (not HTTPS). You should additionally use JonDoFox in order to also filter encrypted connections.JonDo is available on all major systems (Windows, Mac OS X, Linux).JonDo was and is developed by the JonDos GmbH in cooperation with German universities (TU Dresden, Universität Regensburg) and privacy organizations (Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein).How it worksInstead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user. A relationship between a connection and its user could only be determined if all intermediaries worked together to sabotage the anonymization. more...The intermediaries (mix providers) are generally provided by independent institutions which officially declare, that they do not keep connection log files or exchange such data with other mix providers. JAP shows the identity and number of organisations in each Mix cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades. Developers --- Project LeadershipMix server operation contactUniversity of Regensburg, Department of Business Informatics Chair Management of Information SecurityProf. Dr. Hannes FederrathD-93040 RegensburgTechnical University Dresden, Institute for System Architecture Chair of Privacy and Data SecurityStefan KöpsellD-01062 DresdenDownload JonDo latest clientJAP Anonymity home page Link to comment Share on other sites More sharing options...
myidisbb Posted March 13, 2011 Share Posted March 13, 2011 [interesting. it would require a back door on the system then to the government to do its thing??? Link to comment Share on other sites More sharing options...
Shadows Posted March 13, 2011 Share Posted March 13, 2011 This seems very interesting, I will check it out. Thanks for sharing. :) Link to comment Share on other sites More sharing options...
majithia23 Posted March 13, 2011 Author Share Posted March 13, 2011 [interesting. it would require a back door on the system then to the government to do its thing???it doesnt require a back door to any server ( by government or any individual ) , because , this is what the developer says about the service --- "The anonymization service JonDonym is a development branch of the AN.ON Project. It consists of multiple user selectable mix cascades. A cascade consists of two or three separately encrypted mix servers. These mix servers are operated by independent and non interrelated organizations or private individuals who all publish their identity . in JonDonym only certified and publicized persons and organizations may operate a mix server. The operators have to abide by strict provisions which prohibit saving connection data or exchanging such data with other operators. Every connection from a user is differently encrypted for every mix server within a cascade and transferred through the cascade to the target "its features as outlined by the developers -- Protection against your own Internet access providerProtection against the anonymity service operatorsNo logfilesTransparent functionalityNo software backdoorSecure browser profilePortable anonymityEasy combination with other productsEvolution by researchCompetent, fast and at no charge on comparison with TOR network , this is what they put --- A similar anonymization can only be offered by the non-commercial software Tor. While the Tor hidden services (a special Tor feature) are somewhat affected, the Tor users themselves are also protected against TCP timestamp attacks similar to JonDonym. Internet beginners should be careful with Tor, though: there is no control over who runs the Tor servers over which your private data travels. In the past, there has been ongoing suspicion that criminals and intelligence agencies exploit the Tor network in order to secretly attain unencrypted information like passwords, bank accounts and credit cards. Moreover, certain tricks can enable the Tor server to concentrate much of the traffic on itself, making the exploit even more effective. Tor may be set as proxy in JonDo though, making surfing considerably slower but, in some individual cases, even more secure than with JonDonym alone: thereby the last servers in this chain will then be part of the verified JonDonym network.Like in Tor, the respective last mix server in a JonDonym cascade could record data which is not separately secured by HTTPS/SSL (this has to be offered by the web site itself). Unlike Tor and other services, however, in JonDonym only certified and publicized persons and organizations may operate a mix server. The user may then decide for himself on whether he trusts the operator or not. If needed, they may simply choose other operators. All this makes it highly improbable for criminal operators to infiltrate JonDonym. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.