greta
Uploaded by
12 SLIDES
259 VUES
120LIKES

Anonymous File Transfer Network (AFTN): Secure, Private File Sharing

DESCRIPTION

The Anonymous File Transfer Network (AFTN) allows users to send files anonymously using advanced technologies such as RSA and digital signatures to validate identity. Its architecture relies on the Tor network for anonymity, employing SSL encryption and onion routing for secure data exchanges. AFTN ensures file integrity with MD5 hashing and supports clients in verifying identities and securely managing their encryption keys. Designed with digital privacy in mind, AFTN aims to protect users from government surveillance and censorship while offering a platform for whistleblowers and humanitarian efforts.

1 / 12

Télécharger la présentation

Anonymous File Transfer Network (AFTN): Secure, Private File Sharing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Anonymous File Transfer Network (AFTN) https://sourceforge.net/projects/aftn/ Jared Rose

  2. What is AFTN? • A system forsending files anonymously • Uses RSA & digital signatures for establishing a user’s “identity” • Utilizes the Tor network • SSL Encryption • Onion Routing • Hidden Services • Cross platform compatible Jared Rose

  3. Goals of AFTN • Users of the AFTN are anonymous • Clients can verify the “identities” of other clients and servers • File integrity/validity can be checked • MD5 hashing + file size • Synchronization of contact information between clients and servers Jared Rose

  4. Goals of AFTN (Continued) • Files are protected by end-to-end encryption • Tor + Hidden Services • Secure updating and management of encryption/signing keys on the server • Allow clients to anonymously retrieve key and address information from servers Jared Rose

  5. Why Create AFTN? • Digital privacy concerns • “Big Government” • Whistle blowers • Censorship • Humanitarian work • Its interesting  Jared Rose

  6. Ethical/Legal Concerns • Potential for illegal use • IP infringement • Crime • Malicious software/Spam • Encryption export laws • Open source Jared Rose

  7. How does AFTN work? • Two types of hosts: • Clients • Directory Servers • Nodes connected to Tor network • Outbound connections through Vidalia • Inbound connections to server sockets listening at a Tor hidden services address • Provides anonymous exchanges between hosts • End to end encryption Jared Rose

  8. Clients & Directory Servers • Clients register with a directory server • Directory servers supply contact info for clients • Clients send files to other clients (P2P) • Clients know servers contact info through white lists • Clients of non-whitelisted servers ignored • Permits organizations to be “off the grid” Jared Rose

  9. Tor • Provides anonymity through onion routing • Hidden Services: • NAT/Firewall traversal • End to end encryption • Hides server locations • Bandwidth/Speed are issues • Onion routing is bandwidth intensive • Speed influence by the types of node you traverse Jared Rose

  10. Anonymity and User Identity • Q. If anonymous, how do we know we are talking to the right person? • A. Public Key Cryptography! • Public/Private signing key Jared Rose

  11. Anonymity and User Identity • When clients register with a server: • Create unique name/server pair answer (name#server) • Register public “master” key used for signing other keys • Any changes to keys/information on server must be signed w/ master key • Master key can be stored separate from the rest of the system for security Jared Rose

  12. Where are we at Right Now? Jared Rose

More Related