[prev in list] [next in list] [prev in thread] [next in thread] 

List:       tor-dev
Subject:    Re: [tor-dev] Pluggable transports research
From:       Jodi Spacek <jodi.spacek () gmail ! com>
Date:       2018-01-25 6:43:03
Message-ID: CANYVXb9=0aGL+que0f2OAk1LK9ZWWJCuDbp7K=rS-zQeCvEhwQ () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


On Wed, Jan 24, 2018 at 5:32 PM, David Fifield <david@bamsoftware.com>
wrote:

> On Wed, Jan 24, 2018 at 04:42:52PM -0800, Jodi Spacek wrote:
> > I'm a master's student at the University of British Columbia (Vancouver,
> > Canada) where I'm primarily researching anonymous systems and
> censorship. I
> > would be delighted to contribute to pluggable transports.
> >
> > Of particular interest is image and audio data stenography - is anything
> is in
> > the works for this or is it outdated? My aim is to add this
> functionality while
> > fully testing and evaluating it as part of my thesis project. I refer to
> the
> > list of idea suggestions here:
> > https://trac.torproject.org/projects/tor/wiki/doc/PluggableT
> ransports/ideas
>
> Circumvention research can probably learn a lot from steganography
> research. Most of the "mainstream" research on circumvention (read: the
> work I'm familiar with :D) is in CensorBib:
>         https://censorbib.nymity.ch/
> However I've been meaning to see what else we can learn by bringing
> related research into its scope. There's a thread of research by
> Sebastian Zander et al. on covert channels that hardly intersects with
> circumvention research; it would be a good contribution if you could
> determine to what extent the two worlds can be joined. For example
> "Reliable Transmission Over Covert Channels in First Person Shooter
> Multiplayer Games" predates Rook and Castle. They developed an
> evaluation framework that to my knowledge hasn't been applied to
> circumvention protocols.
>         http://caia.swin.edu.au/cv/szander/cc/index.html
>         http://caia.swin.edu.au/cv/szander/cc/cchef/
> "Provably Secure Steganography" by Hopper et al. could be relevant to
> certain kinds of circumvention protocols.
>         https://www-users.cs.umn.edu/~hoppernj/tc-stego.pdf
>
> The traffic-obf list is a group of circumvention researchers. They are
> scheduling biweekly meetings on IRC. You could discuss some ideas there.
> https://groups.google.com/d/msg/traffic-obf/VtsKZA2Akmk/-v3Ajct-AwAJ
>

This is a promising direction! I'll look into covert channels with
steganography in mind and its overlap with circumvention.


Actually, I just finished reading your thesis - it's an excellent resource
for navigating related works and comprehending the interplay of
circumvention and censorship. Thanks very much for the additional links (:

[Attachment #5 (text/html)]

<div dir="ltr">







<p class="m_-1567972521822874407gmail-p1" \
style="margin:0px;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:&quot;Helvetica \
Neue&quot;;color:rgb(69,69,69)"><br></p><div class="gmail_extra"><div \
class="gmail_quote">On Wed, Jan 24, 2018 at 5:32 PM, David Fifield <span \
dir="ltr">&lt;<a href="mailto:david@bamsoftware.com" \
target="_blank">david@bamsoftware.com</a>&gt;</span> wrote:<br><blockquote \
class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><span class="m_-1567972521822874407gmail-">On Wed, \
Jan 24, 2018 at 04:42:52PM -0800, Jodi Spacek wrote:<br> &gt; I&#39;m a master&#39;s \
student at the University of British Columbia (Vancouver,<br> &gt; Canada) where \
I&#39;m primarily researching anonymous systems and censorship. I<br> &gt; would be \
delighted to contribute to pluggable transports.  <br> &gt;<br>
&gt; Of particular interest is image and audio data stenography - is anything is \
in<br> &gt; the works for this or is it outdated? My aim is to add this functionality \
while<br> &gt; fully testing and evaluating it as part of my thesis project. I refer \
to the<br> &gt; list of idea suggestions here:  <br>
&gt; <a href="https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports/ideas" \
rel="noreferrer" target="_blank">https://trac.torproject.org/pr<wbr>ojects/tor/wiki/doc/PluggableT<wbr>ransports/ideas</a> \
<br> <br>
</span>Circumvention research can probably learn a lot from steganography<br>
research. Most of the &quot;mainstream&quot; research on circumvention (read: the<br>
work I&#39;m familiar with :D) is in CensorBib:<br>
            <a href="https://censorbib.nymity.ch/" rel="noreferrer" \
target="_blank">https://censorbib.nymity.ch/</a><br> However I&#39;ve been meaning to \
see what else we can learn by bringing<br> related research into its scope. \
There&#39;s a thread of research by<br> Sebastian Zander et al. on covert channels \
that hardly intersects with<br> circumvention research; it would be a good \
contribution if you could<br> determine to what extent the two worlds can be joined. \
For example<br> &quot;Reliable Transmission Over Covert Channels in First Person \
Shooter<br> Multiplayer Games&quot; predates Rook and Castle. They developed an<br>
evaluation framework that to my knowledge hasn&#39;t been applied to<br>
circumvention protocols.<br>
            <a href="http://caia.swin.edu.au/cv/szander/cc/index.html" \
rel="noreferrer" target="_blank">http://caia.swin.edu.au/cv/sza<wbr>nder/cc/index.html</a><br>
                
            <a href="http://caia.swin.edu.au/cv/szander/cc/cchef/" rel="noreferrer" \
target="_blank">http://caia.swin.edu.au/cv/sza<wbr>nder/cc/cchef/</a><br> \
&quot;Provably Secure Steganography&quot; by Hopper et al. could be relevant to<br> \
certain kinds of circumvention protocols.<br>  <a \
href="https://www-users.cs.umn.edu/~hoppernj/tc-stego.pdf" rel="noreferrer" \
target="_blank">https://www-users.cs.umn.edu/~<wbr>hoppernj/tc-stego.pdf</a><br> <br>
The traffic-obf list is a group of circumvention researchers. They are<br>
scheduling biweekly meetings on IRC. You could discuss some ideas there.<br>
<a href="https://groups.google.com/d/msg/traffic-obf/VtsKZA2Akmk/-v3Ajct-AwAJ" \
rel="noreferrer" target="_blank">https://groups.google.com/d/ms<wbr>g/traffic-obf/VtsKZA2Akmk/-v3A<wbr>jct-AwAJ</a><br>
 </blockquote></div><br></div><div class="gmail_extra"><p \
class="m_-1567972521822874407gmail-p1" \
style="font-variant-numeric:normal;font-variant-east-asian:normal;margin:0px;font-stretch:normal;line-height:normal;color:rgb(69,69,69)"><font \
face="arial, helvetica, sans-serif">This is a promising direction! I'll look into \
covert channels with steganography in mind and its overlap with circumvention.<span \
class="m_-1567972521822874407gmail-Apple-converted-space">  </span></font></p><p \
class="m_-1567972521822874407gmail-p2" \
style="font-variant-numeric:normal;font-variant-east-asian:normal;margin:0px;font-stretch:normal;line-height:normal;color:rgb(69,69,69);min-height:14px"><font \
face="arial, helvetica, sans-serif"><br></font></p><p \
class="m_-1567972521822874407gmail-p1" \
style="font-variant-numeric:normal;font-variant-east-asian:normal;margin:0px;font-stretch:normal;line-height:normal;color:rgb(69,69,69)"><font \
face="arial, helvetica, sans-serif">Actually, I just finished reading your thesis - \
it's an excellent resource for navigating related works and comprehending the \
interplay of circumvention and censorship. Thanks very much for the additional links \
(:<span class="m_-1567972521822874407gmail-Apple-converted-space">  \
</span></font></p></div></div>


[Attachment #6 (text/plain)]

_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic