You are here: FIDIS Interactive > FIDIS Database on IMS > 

FIDIS Interactive

More about this database.

Database on Identity Management Systems

Back

“AN.ON - Anonymity Online (Version: 00.09.019 )”:

Manufacturer of the IMS

  • Dresden University
  • URL: (Visit Homepage)
  • Nature of provider / distributor: Public
  • Nationality of the manufacturer: Germany

Type of the IMS / Class of the IMS

  • Type of the IMS: Type 3
  • Class of the IMS: Class 1

Supported languages

  • Germany: German
  • England: English

References for the IMS

anon-online.de

Is the IMS an open/closed IMS?

State of IMS deployment

Distribution of the IMS

Geographic scope

Is the IMS an open/closed IMS?: Open

State of IMS deployment: Prototype

Distribution of the IMS: Public Domain

Geographic scope: Global

Hard and software requirements of the IMS

Client: Java Engine (Requirements for Mix-servers see below)

Installed base of the IMS (Userbase)

At time of review nearly 2000 actual users simultaneously

Interoperability and supported standards

JAP is interoperable with any application allowing usage of local proxies to route web-traffic through.

Server-side component(s)

JAP uses a structure of anonymity-servers called “Mixes” arranged in fixed cascades Traffic is routed from JAP-application on user’s PC to a definded Mix-server, then forwarded through the cascade. No data is stored on server beyond time of processing.

Client-side component(s)

JAP-application on the PC receives web-traffic, encrypts it repeatedly for any Mix-server on the way and sends it to the cascade’s entry-point. No data is stored on server beyond time of processing.

Description of functionality / features (client and server)

Hybrid encryption between JAP-client and Mix-cascade. Complete anonymisation of web traffic.

Main functionality

Anonymisation of web-traffic

Purchase costs in EUR

0

Flow charts of the IMS

Click to enlarge

Screenshots of the IMS

Click to enlarge

Other file resources

N/A

Evaluator of the IMS

Christian Krause (ICPP)

General Comments (free text)

Data-packets are encrypted several times, depending on the number of Mix-servers in the chosen cascade. Since every server only decrypts his layer of encryption, no single server gets information about content, sender and destination. There are servers with knowledge about the origin, others know nothing but having received a packet from a Mix-server. The last server in the cascade finally decrypts the packet and forwards the content to the final destination. The last server does not know where the packet came from. So even if security of a single server is breached, anonymity is not compromised until all servers are breached.

Mixes contain facility of law-enforcement. This feature must be activated seperately and can never recover traffic from the past. The feature only enables monitoring of single IP-addresses, thus still providing anonymity to the other users.

To run a mix-server with pre-compiled software, a Linux-based system is needed. Also a Live-CD exists which can be booted whitout the hassle of installation. Windows systems may be also used, though packages have to be compiled seperately with Eclipse or Microsoft Visual C++ .NET.

 

As of 2007-06-22 the service is run by JonDos GmbH (http://www.jondonym.de/). JonDos offers paid services additionally to free basic service.

Back (This Record was last updated on: 18-03-2008 14:20)