Roger Dingledine | |
---|---|
Born | Roger Dingledine United States |
Other names | arma |
Occupation(s) | Director and Research Director, the Tor Project |
Known for | Co-Founding Tor and the Tor Project |
Father | Raymond Dingledine |
Roger Dingledine is an American computer scientist known for having co-founded the Tor Project. [1] A student of mathematics, computer science, and electrical engineering, [2] Dingledine is also known by the pseudonym arma. [3] As of December 2016, he continues in a leadership role with the Tor Project, as a project Leader, Director, and Research Director. [4]
Dingledine graduated from MIT with Bachelor of Science degrees in Mathematics and Computer Science and Engineering in 2000. He later obtained a Master of Engineering in Electrical Engineering and Computer Science from MIT. [5]
Tor was developed by Dingledine [6] —with Nick Mathewson and Paul Syverson [4] —under a contract from the United States Naval Research Laboratory. [1] As of 2006, the software they developed was being distributed using proceeds from the Electronic Frontier Foundation, by the Tor Project. [1] As described at the end of 2015,
The Tor Project develops and maintains ... The Tor Browser system, also known as The Onion Router ... a free, open source and sophisticated privacy tool that provides anonymity for web surfing and communication
as well as developing and maintaining other software tools and applications. [7] [8] As of December 2016, Dingledine continues in a leadership role with the Tor project, as a Project Leader, Director, and Research Director. [4] Isabela Bagueros acts as the Tor project's Executive Director. She took over this role in January 2019, having previously been a Project Manager at the Tor project since 2015. [9]
Dingledine has written several highly cited papers, including the Tor design paper titled Tor: The Second-Generation Onion Router, [10] which won the Usenix Security "Test of Time" award. [11] Other highly cited papers include Mixminion’s protocols for anonymous email, [12] the Free Haven Project distributed anonymous storage service, [13] various attacks and vulnerabilities related to anonymity technologies, [14] [15] and the economics and network effects of technologies for anonymity. [16] [17] [18] [19]
As an advocate for strong privacy, Dingledine is frequently invited to speak about security and privacy, including at academic conferences, [2] the NSF (2014), [20] the NSA (2007), [21] and periodic interviews. [22] [23]
Dingledine was named as one of the 2006 thirty-five Innovators Under 35 by MIT Technology Review , for his work on internet anonymization technologies through the Tor Project. [1] The Review described the importance of the work in this way:
A dissident in China uses Web-based e-mail to contact a journalist in Canada. An intelligence agency wants to surveil a foreign website. Like every operation on the Internet, these activities leave tracks. Online anonymity measures provide a way around this problem; one of the most advanced is Tor, or the Onion Router. / Computer scientist Roger Dingledine developed Tor ... [1]
In 2012, Dingledine and the other two initial developers of Tor, Nick Mathewson and Paul Syverson, were recognized by Foreign Policy magazine as #78 in their top 100 global thinkers. [24]
Dingledine has drawn attention after the leak of NSA documents by Edward Snowden, and public disclosure of the rules guiding the operation of XKeyscore, the NSA's collection system, given XKeyscore's targeting of Tor Project onion servers, including the one Dingledine runs at MIT, which serves a directory authority for the system, as well as being the base of operation of the Mixminion mail service, and host to various gaming and other websites (from which the NSA might be collecting IP addresses). [25]
Publicly released exploit works reliably against a wide range of Firefox versions.
Mixmaster is a Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. It is an implementation of a David Chaum's mix network.
An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anonymous remailers, and nym servers, among others, which differ in how they work, in the policies they adopt, and in the type of attack on the anonymity of e-mail they can resist. Remailing as discussed in this article applies to e-mails intended for particular recipients, not the general public. Anonymity in the latter case is more easily addressed by using any of several methods of anonymous publication.
A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user.
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.
A darknet or dark net is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.
The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralized system of data storage. The group's work led to a collaboration with the United States Naval Research Laboratory to develop Tor, funded by DARPA.
In anonymity networks, it is important to be able to measure quantitatively the guarantee that is given to the system. The degree of anonymity is a device that was proposed at the 2002 Privacy Enhancing Technology (PET) conference. Two papers put forth the idea of using entropy as the basis for formally measuring anonymity: "Towards an Information Theoretic Metric for Anonymity", and "Towards Measuring Anonymity". The ideas presented are very similar with minor differences in the final definition of .
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes which take in messages from multiple senders, shuffle them, and send them back out in random order to the next destination. This breaks the link between the source of the request and the destination, making it harder for eavesdroppers to trace end-to-end communications. Furthermore, mixes only know the node that it immediately received the message from, and the immediate destination to send the shuffled messages to, making the network resistant to malicious mix nodes.
Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer.
Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.
Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy, a crucial aspect of modern online interactions and services, can be defined under three sub-related categories: information privacy, communication privacy, and individual privacy.
The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientists Roger Dingledine, Nick Mathewson, and five others. The Tor Project is primarily responsible for maintaining software for the Tor anonymity network.
Ricochet or Ricochet IM is a free software, multi-platform, instant messaging software project originally developed by John Brooks and later adopted as the official instant messaging client project of the Invisible.im group. A goal of the Invisible.im group is to help people maintain privacy by developing a "metadata free" instant messaging client.
Riffle is an anonymity network developed by researchers at MIT and EPFL as a response to the problems of the Tor network.
The Update Framework (TUF) is a software framework designed to protect mechanisms that automatically identify and download updates to software. TUF uses a series of roles and keys to provide a means to retain security, even when some keys or servers are compromised. It does this with a stated goal of requiring minimal changes and effort from repository administrators, software developers, and end users. In this way, it protects software repositories, which are an increasingly desirable target for hackers.
George Danezis, FBCS is a computer scientist and Professor of Security and Privacy Engineering at the Department of Computer Science, University College London where he is part of the Information Security Research Group, and a fellow at the Alan Turing Institute. He co-founded Chainspace, a sharded smart contract platform, and was Head of Research before it was acquired by Facebook. After leaving Facebook he co-founded MystenLabs and is one of the designers of the Sui Blockchain. He currently works part-time as a Professor at University College London and as Chief Scientist at MystenLabs.
Paul Syverson is a computer scientist best known for inventing onion routing, a feature of the Tor anonymity network.
Hard privacy technologies are methods of protecting data. Hard privacy technologies and soft privacy technologies both fall under the category of privacy-enhancing technologies. Hard privacy technologies allow online users to protect their privacy through different services and applications without the trust of the third-parties. The data protection goal is data minimization and reduction of the trust in third-parties and the freedom to conceal information or to communicate.
Nick Mathewson is an American computer scientist and co-founder of The Tor Project. He, along with Roger Dingledine, began working on onion routing shortly after they graduated from Massachusetts Institute of Technology (MIT) in the early 2000s. He is also known by his pseudonym nickm. Mathewson and Dingledine were the focus of increased media attention after the leak of NSA's highly classified documents by Edward Snowden, and the subsequent public disclosure of the operation of XKeyscore, which targeted one of The Tor Project's onion servers along with Mixminion remailer which are both run at MIT.
The Nym mixnet is a free and open-source software designed to ensure a high level of privacy in all online communications. It is an implementation of a mix network devised by David Chaum in 1981.
{{cite journal}}
: Cite journal requires |journal=
(help)