Abstract
Five years ago, “Privacy-enhancing technologies for the Internet” [23] examined the state of the then newly emerging privacy-enhancing technologies. In this survey paper, we look back at the last five years to see what has changed, what has stagnated, what has succeeded, what has failed, and why. We also look at current trends with a view towards the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ross Anderson. The eternity service. In Proc. Pragocrypt’ 96, pages 242–252, 1996.
Anonymizer.com. Online privacy services. http://www.anonymizer.com/.
Associated Press. Napster settles with Metallica. Wired News, 12 July 2001.
Adam Back. The eternity service. Phrack Magazine, 7(51), 1 September 1997.
Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). In Security Protocols Workshop, pages 59–63, 1998.
Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom Systems 2.0 Architecture. http://www.freedom.net/products/whitepapers/FreedomSystem2Architecture.pdf, December 2000.
Stefan Brands. Rethinking Public Key Infrastructure and Digital Certificates —Building in Privacy. MIT Press, 2000.
Bundesministerium für Bildung, Wissenschaft, Forschung und Technologie. Act on the Protection of Personal Data Used in Teleservices (Teleservices Data Protection Act —Teledienstedatenschutzgesetz TDDSG). Federal Law Gazette I, page 1870, 1997. http://www.datenschutz-berlin.de/recht/de/rv/tkmed/iukdgen.htm#a2.
David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, Proc. Crypto’ 82. Plenum Press, 1983.
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46–66, 2000.
Computer Cryptology. Apas anonymous remailer use. http://www.faqs.org/faqs/privacy/anon-server/faq/use/part3/section-3.html, 2 December 2001.
Wei Dai. Pipenet. http://www.eskimo.com/~weidai/pipenet.txt, February 1995. Post to the cypherpunks mailing list.
Michelle Delio. MS TV: It’ll Be Watching You. Wired News, 11 December 2001.
Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Un-observability, pages 67–95, 2000.
eBay, Inc. The world’s online marketplace. http://www.ebay.com/.
European Communities. Data Protection. http://europa.eu.int/comm/intern almarket/en/dataprot/law/.
David Farley. Doctor fun. http://www.ibiblio.org/Dave/Dr-Fun/df9601/df960124.jpg, 24 January 1996.
FastTrack. P2P Technology. http://www.fasttrack.nu/.
Federal Trade Commission. Children’s Online Privacy Protection Act of 1998. http://www.ftc.gov/opa/1999/9910/childfinal.htm.
Federal Trade Commission. Gramm-Leach-Bliley Act. http://www.ftc.gov/privacy/glbact/.
Hannes Federrath. JAP —Anonymity & Privacy. http://anon.inf.tu-dresden.de/indexen.html.
Gnutella News. Welcome to Gnutella. http://gnutella.wego.com/.
Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the Internet. In Proceedings of IEEE COMPCON’ 97, 1997.
David Goldshlag, Michael Reed, and Paul Syverson. Hiding routing information. In Information Hiding, First International Workshop, pages 137–150, May 1996.
David Goldshlag, Michael Reed, and Paul Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2), February 1999.
Google. Google groups. http://groups.google.com/.
Health Care Financing Administration. HIPAA Welcome Page. http://www.hcfa.gov/medicaid/hipaa/default.asp.
Johan Helsingius. Johan helsingius closes his internet remailer. http://www.cyberpass.net/security/penet.press-release.html, 30 August 1996.
IBM Corporation. Tivoli Security Products. http://www.tivoli.com/products/solutions/security/products.html.
The Internet Archive. Wayback machine. http://web.archive.org/.
InterTrust Technologies Corporation. InterTrust Strategic Technologies and Architectural Research Laboratory. http://www.star-lab.com/.
Junkbusters Corporation. Internet Junkbuster Headlines. http://internet.junkbuster.com/ijb.html.
David Kristol and Lou Montulli. HTTP State Management Mechanism, October 2000. RFC 2965.
Lawrence Lessig. Code and Other Laws of Cyberspace. Basic Books, 1999.
Raph Levien. Advogato’s trust metric. http://www.advogato.org/trust-metric.html.
David Maziéres and M. Frans Kaashoek. The design, implementation and operation of an email pseudonym server. In Proc. 5th ACM Conference on Computer and Communications Security, pages 27–36. ACM Press, November 1998.
Microsoft Corporation. Microsoft.NET. http://microsoft.com/net/whatis.asp.
Napster, Inc. Napster. http://www.napster.com/.
Open Source Development Network. Slashdot: News for nerds, stuff that matters. http://slashdot.org/.
PayPal. http://www.paypal.com/.
Privacy Commissioner of Canada. The Personal Information Protection and Electronic Documents Act. http://www.privcom.gc.ca/legislation/020601e.asp
Joseph Reagle and Lorrie Faith Cranor. The Platform for Privacy Preferences. Communications of the ACM, 42(2):48–55, February 1999.
Michael Reiter and Avi Rubin. Anonymous web transactions with crowds. Communications of the ACM, 42(2):32–48, February 1999.
SafeWeb. Safeweb startpage. https://www.safeweb.com/.
Len Sassaman and Ulf Möller. Mixmaster. http://sourceforge.net/projects/mixmaster/.
Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, November 1979.
Sun Microsystems, Inc. Liberty Alliance. http://www.projectliberty.org/.
U.S. Department of Justice. Identity theft and fraud. http://www.usdoj.gov/criminal/fraud/idtheft.html, 5 June 2000.
Marc Waldman, Avi Rubin, and Lorrie Faith Cranor. Publius: a robust, tamper-evident, censorship-resistant and source-anonymous web publishing system. In Proc. 9th Usenix Security Symposium, pages 59–72, August 2000.
Zero-Knowledge Systems, Inc. Enterprise Solutions. http://www.zeroknowledge.com/business/.
Zero-Knowledge Systems, Inc. Freedom WebSecure. http://www.freedom.net/products/websecure/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goldberg, I. (2003). Privacy-Enhancing Technologies for the Internet, II: Five Years Later. In: Dingledine, R., Syverson, P. (eds) Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science, vol 2482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36467-6_1
Download citation
DOI: https://doi.org/10.1007/3-540-36467-6_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00565-0
Online ISBN: 978-3-540-36467-2
eBook Packages: Springer Book Archive