Nick Mathewson

Last updated
Nick Mathewson
Nick Mathewson The Tor Project.png
Nick Mathewson in 2020
Born
Nick Mathewson

United States
NationalityAmerican
Other namesnickm
Occupation(s)Chief Network Architect, Tor Project
Known forCo-Founding Tor and the Tor Project
Website wangafu.net

Nick Mathewson is an American computer scientist and co-founder of The Tor Project. [1] [2] [3] He, along with Roger Dingledine, began working on onion routing shortly after they graduated from Massachusetts Institute of Technology (MIT) in the early 2000s. [4] He is also known by his pseudonym nickm. [1] Mathewson and Dingledine were the focus of increased media attention after the leak of NSA's highly classified documents by Edward Snowden, and the subsequent public disclosure of the operation of XKeyscore, which targeted one of The Tor Project's onion servers along with Mixminion remailer which are both run at MIT. [5]

Contents

Education

Mathewson graduated from MIT in 2002, earning a Bachelor of Science degree in Computer Science. He later earned a Master of Engineering in Computer Science and Linguistics from MIT. [6]

Works

The Tor Project

Tor was developed by Mathewson, along with his two colleagues, under a contract from the United States Naval Research Laboratory. [7] [3] Mathewson is also lead developer responsible for the security, design, maintenance of the Tor protocol, along with sending out security patches. [6]

libevent

He is also the primary maintainer for libevent, an event notification library used by some prominent applications like Google Chrome, Transmission and also Tor. [8] [6]

Honors

Mathewson, along with the other two developers of the Tor Project (Roger Dingledine and Paul Syverson), were recognized in 2012, by Foreign Policy magazine as #78 in their list of the top 100 global thinkers of the year. [9]

Selected publications

Related Research Articles

A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.

Mixmaster is a Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. It is an implementation of a Chaumian Mix network.

A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user.

<span class="mw-page-title-main">Len Sassaman</span> American technologist and cryptographer (1980–2011)

Leonard Harris Sassaman was an American technologist, information privacy advocate, and the maintainer of the Mixmaster anonymous remailer code and operator of the randseed remailer. Much of his career gravitated towards cryptography and protocol development.

<span class="mw-page-title-main">Onion routing</span> Technique for anonymous communication over a computer network

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.

A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.

The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralized system of data storage. The group's work led to a collaboration with the United States Naval Research Laboratory to develop Tor, funded by DARPA.

<span class="mw-page-title-main">Java Anon Proxy</span> Anonymity network

Java Anon Proxy (JAP) also known as JonDonym, was a proxy system designed to allow browsing the Web with revocable pseudonymity. It was originally developed as part of a project of the Technische Universität Dresden, the Universität Regensburg and Privacy Commissioner of the state of Schleswig-Holstein. The client-software is written in the Java programming language. The service has been closed since August 2021.

In anonymity networks, it is important to be able to measure quantitatively the guarantee that is given to the system. The degree of anonymity is a device that was proposed at the 2002 Privacy Enhancing Technology (PET) conference. Two papers put forth the idea of using entropy as the basis for formally measuring anonymity: "Towards an Information Theoretic Metric for Anonymity", and "Towards Measuring Anonymity". The ideas presented are very similar with minor differences in the final definition of .

<span class="mw-page-title-main">Mix network</span> Routing protocol

Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes which take in messages from multiple senders, shuffle them, and send them back out in random order to the next destination. This breaks the link between the source of the request and the destination, making it harder for eavesdroppers to trace end-to-end communications. Furthermore, mixes only know the node that it immediately received the message from, and the immediate destination to send the shuffled messages to, making the network resistant to malicious mix nodes.

Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer.

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide, volunteer overlay network that consists of more than seven thousand relays.

<span class="mw-page-title-main">Tails (operating system)</span> Linux distribution for anonymity and privacy

Tails, or "The Amnesic Incognito Live System," is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so. It can also be run as a virtual machine, with some additional security risks. The Tor Project provided financial support for its development in the beginnings of the project, and continues to do so alongside numerous corporate and anonymous sponsors.

<span class="mw-page-title-main">Whonix</span> Anonymous Operating System

Whonix is a Kicksecure–based security hardened Linux distribution. Its main goals are to provide strong privacy and anonymity on the Internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network.

<span class="mw-page-title-main">The Tor Project</span> Free and open-source software project for enabling anonymous communication

The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, New Hampshire. It is founded by computer scientists Roger Dingledine, Nick Mathewson, and five others. The Tor Project is primarily responsible for maintaining software for the Tor anonymity network.

<span class="mw-page-title-main">Ricochet (software)</span> Instant messaging software

Ricochet or Ricochet IM is a free software, multi-platform, instant messaging software project originally developed by John Brooks and later adopted as the official instant messaging client project of the Invisible.im group. A goal of the Invisible.im group is to help people maintain privacy by developing a "metadata free" instant messaging client.

<span class="mw-page-title-main">Roger Dingledine</span> American computer scientist

Roger Dingledine is an American computer scientist known for having co-founded the Tor Project. A student of mathematics, computer science, and electrical engineering, Dingledine is also known by the pseudonym arma. As of December 2016, he continues in a leadership role with the Tor Project, as a project Leader, Director, and Research Director.

<span class="mw-page-title-main">Paul Syverson</span> Computer scientist and mathematician at the US Naval Research Laboratory, inventor of onion routing

Paul Syverson is a computer scientist best known for inventing onion routing, a feature of the Tor anonymity network.

Hard privacy technologies are methods of protecting data. Hard privacy technologies and soft privacy technologies both fall under the category of privacy enchancing technologies. Hard privacy technologies allow online users to protect their privacy through different services and applications without the trust of the third-parties. The data protection goal is data minimization and reduction of the trust in third-parties and the freedom to conceal information or to communicate.

References

  1. 1 2 "Core Tor developers". The Tor Project. Archived from the original on 6 October 2021. Retrieved 2 October 2021.
  2. Castillo, Michael del (21 August 2021). "Chelsea Manning Is Back, And Hacking Again, Only This Time For A Bitcoin-Based Privacy Startup". Forbes. Archived from the original on 1 October 2021. Retrieved 2 October 2021.
  3. 1 2 Perlroth, Nicole (2016). "Tor Project, a Digital Privacy Group, Reboots With New Board". New York Times. Archived from the original on 2 May 2021.
  4. "The history of Tor". The Tor Project. Retrieved 2 October 2021.
  5. Zetter, Kim (2014-07-03). "The NSA Is Targeting Users of Privacy Services, Leaked Code Shows" (print and online). Wired. Archived from the original on 17 August 2021. Retrieved 2 October 2021.
  6. 1 2 3 "Nick Mathewson". Archived from the original on 23 August 2021. Retrieved 2 October 2021.
  7. MIT Tech Rev Staff (2006). "Innovators Under 35: Roger Dingledine" (print and online). MIT Technology Review (September/October). Archived from the original on 2 October 2021. Retrieved 2 October 2021.
  8. "libevent – an event notification library". Archived from the original on 17 September 2022. Retrieved 17 September 2022.
  9. Wittmeyer, Alicia P.Q (2012). "The FP Top 100 Global Thinkers". Foreign Policy. Archived from the original on 19 September 2021. Retrieved 6 October 2021.