Download now Free registration required
Today's Internet architecture makes no deliberate attempt to provide identity privacy - IP addresses are, for example, often static and the consistent use of a single IP address can leak private information to a remote party. Existing approaches for rectifying this situation and improving identity privacy fall into one of two broad classes: building a privacy-enhancing overlay layer (Like Tor) that can run on top of the existing Internet or research into principled but often fundamentally different new architectures. The authors suggest a middle-ground: enlisting ISPs to assist in improving the identity privacy of users in a manner compatible with the existing Internet architecture, ISP best practices, and potential legal requirements.
- Format: PDF
- Size: 275.75 KB