Anonymity on mobile devices
dvorak
dvorak at xs4all.nl
Tue Sep 20 18:05:04 UTC 2005
Hi,
<SNIP piece explaining why tor on the device is not feasable>
> So we switched to a different architecture: now there is gateway to
> which the user connects to and which does all the anonymizing for him.
> This means we have a single point of failure, but we only need to
> connect securely (TLS,VPN,...) to the gateway.
> Additionally we want to enable the user to choose the way of
> anonymizing, e.g. using Jap or Tor. Because of this and because we use
> the gateway for some other things, we had to design our own protocol
> which is similar to Socks, but has some additional parameter for the
> anonymity configuration.
> So our architecture looks like this: the mobile client connects securely
> (by VPN) to the gateway, then it sends a Socks-like connect request
> along with the configuration parameters to the gateway, the gateway
> sends a request to the chosen anonymity service (e.g. talking socks5 to
> Tor on port 9050) and after the connection has been established the
> gateway forwards all incoming data.
>
> What do you think of this architecture and of anonymity on mobile
> devices in general? There was a system called mCrowds which implemented
> Crowd's Jondos on WAP-gateways. Does anyone know it?
What do you want to protect against ? the provider snooping? if so where is
this gateway running?
gtx.
dvorak
More information about the tor-talk
mailing list