SecurePost: Verified Group-Anonymity on Social Media

As Internet freedoms are increasingly threatened both at home and abroad, marginalized groups, such as journalists, activists, and government watchdogs require new tools to retain free and open discourse on-line. In this paper, we introduce SecurePost a tool for verified group anonymity on social media. SecurePost gives social media posters anonymity while safeguarding group credibility through the use of revocable asymmetric keys and an anonymizing proxy. It provides trust to readers via the use of HMAC verification signatures appended to posts verifying integrity and authenticity of a post. We root our work in survey-based research and ethnographic interviews conducted with marginalized groups in Mongolia, Turkey, and Zambia from 2014 to 2016. SecurePost widens the toolkit of security applications, by giving vulnerable communities a way of balancing individual anonymity and safety with group credibility.

[1]  Margaret E. Roberts,et al.  How Censorship in China Allows Government Criticism but Silences Collective Expression , 2013, American Political Science Review.

[2]  Emiliano De Cristofaro,et al.  Censorship in the Wild: Analyzing Internet Filtering in Syria , 2014, Internet Measurement Conference.

[3]  J. Alex Halderman,et al.  Internet Censorship in Iran: A First Look , 2013, FOCI.

[4]  Nino Vincenzo Verde,et al.  Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey , 2014, 2014 IEEE International Symposium on Software Reliability Engineering Workshops.

[5]  Marco Chiesa,et al.  Analysis of country-wide internet outages caused by censorship , 2011, IMC '11.

[6]  Benjamin Edelman,et al.  Internet Filtering in China , 2003, IEEE Internet Comput..

[7]  Dan Boneh,et al.  Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.

[8]  Jedidiah R. Crandall,et al.  ConceptDoppler: a weather tracker for internet censorship , 2007, CCS '07.

[9]  Joss Wright,et al.  Internet Filtering in Liberal Democracies , 2012, FOCI.

[10]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[11]  Stefan Lindskog,et al.  How the Great Firewall of China is Blocking Tor , 2012, FOCI.

[12]  Elizabeth M. Belding-Royer,et al.  Limits to Internet Freedoms: Being Heard in an Increasingly Authoritarian World , 2017, LIMITS.

[13]  Sanja Kelly,et al.  Freedom on the net 2015: privatizing censorship, eroding privacy , 2015 .

[14]  Zubair Nabi The Anatomy of Web Censorship in Pakistan , 2013, FOCI.

[15]  Minaxi Gupta,et al.  Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest , 2013, FOCI.

[16]  SCI Facts and Figures 2015 , 2015, The journal of spinal cord medicine.

[17]  R. Crawshaw,et al.  2. Universal Declaration of Human Rights , 2008 .

[18]  M. Gentzkow,et al.  Social Media and Fake News in the 2016 Election , 2017 .