Skip to main content

Privacy-Enhancing Technologies for the Internet, II: Five Years Later

  • Conference paper
  • First Online:
Privacy Enhancing Technologies (PET 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2482))

Included in the following conference series:

  • 1737 Accesses

Abstract

Five years ago, “Privacy-enhancing technologies for the Internet” [23] examined the state of the then newly emerging privacy-enhancing technologies. In this survey paper, we look back at the last five years to see what has changed, what has stagnated, what has succeeded, what has failed, and why. We also look at current trends with a view towards the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ross Anderson. The eternity service. In Proc. Pragocrypt’ 96, pages 242–252, 1996.

    Google Scholar 

  2. Anonymizer.com. Online privacy services. http://www.anonymizer.com/.

  3. Associated Press. Napster settles with Metallica. Wired News, 12 July 2001.

    Google Scholar 

  4. Adam Back. The eternity service. Phrack Magazine, 7(51), 1 September 1997.

    Google Scholar 

  5. Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). In Security Protocols Workshop, pages 59–63, 1998.

    Google Scholar 

  6. Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom Systems 2.0 Architecture. http://www.freedom.net/products/whitepapers/FreedomSystem2Architecture.pdf, December 2000.

  7. Stefan Brands. Rethinking Public Key Infrastructure and Digital Certificates —Building in Privacy. MIT Press, 2000.

    Google Scholar 

  8. Bundesministerium für Bildung, Wissenschaft, Forschung und Technologie. Act on the Protection of Personal Data Used in Teleservices (Teleservices Data Protection Act —Teledienstedatenschutzgesetz TDDSG). Federal Law Gazette I, page 1870, 1997. http://www.datenschutz-berlin.de/recht/de/rv/tkmed/iukdgen.htm#a2.

  9. David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, Proc. Crypto’ 82. Plenum Press, 1983.

    Google Scholar 

  10. Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46–66, 2000.

    Google Scholar 

  11. Computer Cryptology. Apas anonymous remailer use. http://www.faqs.org/faqs/privacy/anon-server/faq/use/part3/section-3.html, 2 December 2001.

  12. Wei Dai. Pipenet. http://www.eskimo.com/~weidai/pipenet.txt, February 1995. Post to the cypherpunks mailing list.

  13. Michelle Delio. MS TV: It’ll Be Watching You. Wired News, 11 December 2001.

    Google Scholar 

  14. Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Un-observability, pages 67–95, 2000.

    Google Scholar 

  15. eBay, Inc. The world’s online marketplace. http://www.ebay.com/.

  16. European Communities. Data Protection. http://europa.eu.int/comm/intern almarket/en/dataprot/law/.

  17. David Farley. Doctor fun. http://www.ibiblio.org/Dave/Dr-Fun/df9601/df960124.jpg, 24 January 1996.

  18. FastTrack. P2P Technology. http://www.fasttrack.nu/.

  19. Federal Trade Commission. Children’s Online Privacy Protection Act of 1998. http://www.ftc.gov/opa/1999/9910/childfinal.htm.

  20. Federal Trade Commission. Gramm-Leach-Bliley Act. http://www.ftc.gov/privacy/glbact/.

  21. Hannes Federrath. JAP —Anonymity & Privacy. http://anon.inf.tu-dresden.de/indexen.html.

  22. Gnutella News. Welcome to Gnutella. http://gnutella.wego.com/.

  23. Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the Internet. In Proceedings of IEEE COMPCON’ 97, 1997.

    Google Scholar 

  24. David Goldshlag, Michael Reed, and Paul Syverson. Hiding routing information. In Information Hiding, First International Workshop, pages 137–150, May 1996.

    Google Scholar 

  25. David Goldshlag, Michael Reed, and Paul Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2), February 1999.

    Google Scholar 

  26. Google. Google groups. http://groups.google.com/.

  27. Health Care Financing Administration. HIPAA Welcome Page. http://www.hcfa.gov/medicaid/hipaa/default.asp.

  28. Johan Helsingius. Johan helsingius closes his internet remailer. http://www.cyberpass.net/security/penet.press-release.html, 30 August 1996.

  29. IBM Corporation. Tivoli Security Products. http://www.tivoli.com/products/solutions/security/products.html.

  30. The Internet Archive. Wayback machine. http://web.archive.org/.

  31. InterTrust Technologies Corporation. InterTrust Strategic Technologies and Architectural Research Laboratory. http://www.star-lab.com/.

  32. Junkbusters Corporation. Internet Junkbuster Headlines. http://internet.junkbuster.com/ijb.html.

  33. David Kristol and Lou Montulli. HTTP State Management Mechanism, October 2000. RFC 2965.

    Google Scholar 

  34. Lawrence Lessig. Code and Other Laws of Cyberspace. Basic Books, 1999.

    Google Scholar 

  35. Raph Levien. Advogato’s trust metric. http://www.advogato.org/trust-metric.html.

  36. David Maziéres and M. Frans Kaashoek. The design, implementation and operation of an email pseudonym server. In Proc. 5th ACM Conference on Computer and Communications Security, pages 27–36. ACM Press, November 1998.

    Google Scholar 

  37. Microsoft Corporation. Microsoft.NET. http://microsoft.com/net/whatis.asp.

  38. Napster, Inc. Napster. http://www.napster.com/.

  39. Open Source Development Network. Slashdot: News for nerds, stuff that matters. http://slashdot.org/.

  40. PayPal. http://www.paypal.com/.

  41. Privacy Commissioner of Canada. The Personal Information Protection and Electronic Documents Act. http://www.privcom.gc.ca/legislation/020601e.asp

  42. Joseph Reagle and Lorrie Faith Cranor. The Platform for Privacy Preferences. Communications of the ACM, 42(2):48–55, February 1999.

    Google Scholar 

  43. Michael Reiter and Avi Rubin. Anonymous web transactions with crowds. Communications of the ACM, 42(2):32–48, February 1999.

    Google Scholar 

  44. SafeWeb. Safeweb startpage. https://www.safeweb.com/.

  45. Len Sassaman and Ulf Möller. Mixmaster. http://sourceforge.net/projects/mixmaster/.

  46. Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, November 1979.

    Google Scholar 

  47. Sun Microsystems, Inc. Liberty Alliance. http://www.projectliberty.org/.

  48. U.S. Department of Justice. Identity theft and fraud. http://www.usdoj.gov/criminal/fraud/idtheft.html, 5 June 2000.

  49. Marc Waldman, Avi Rubin, and Lorrie Faith Cranor. Publius: a robust, tamper-evident, censorship-resistant and source-anonymous web publishing system. In Proc. 9th Usenix Security Symposium, pages 59–72, August 2000.

    Google Scholar 

  50. Zero-Knowledge Systems, Inc. Enterprise Solutions. http://www.zeroknowledge.com/business/.

  51. Zero-Knowledge Systems, Inc. Freedom WebSecure. http://www.freedom.net/products/websecure/.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Goldberg, I. (2003). Privacy-Enhancing Technologies for the Internet, II: Five Years Later. In: Dingledine, R., Syverson, P. (eds) Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science, vol 2482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36467-6_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-36467-6_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00565-0

  • Online ISBN: 978-3-540-36467-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics