Nym is an extremely simple way to allow pseudonymous access to Internet services via anonymizing networks like Tor, without losing the ability to limit vandalism using popular techniques such as blocking owners of offending IP or email addresses. Nym uses a very straightforward application of blind signatures to create a pseudonymity system with extremely low barriers to adoption. Clients use an entirely browser-based application to pseudonymously obtain a blinded token which can be anonymously exchanged for an ordinary TLS client certificate. In the appendix, we give the complete Javascript application and the necessary patch to use client certificates in the popular web application MediaWiki, which powers the popular free encyclopedia Wikipedia. Thus, Nym is a complete solution, able to be deployed with a bare minimum of time and infrastructure support.
[1]
Amos Fiat,et al.
Untraceable Electronic Cash
,
1990,
CRYPTO.
[2]
J. Doug Tygar,et al.
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
,
1999,
USENIX Security Symposium.
[3]
Paul F. Syverson,et al.
Unlinkable serial transactions: protocols and applications
,
1999,
TSEC.
[4]
Stefan A. Brands,et al.
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
,
2000
.
[5]
Marianne Winslett,et al.
Negotiating Trust on the Web
,
2002,
IEEE Internet Comput..
[6]
Simson L. Garfinkel,et al.
Email-Based Identification and Authentication: An Alternative to PKI?
,
2003,
IEEE Secur. Priv..
[7]
Nick Mathewson,et al.
Tor: The Second-Generation Onion Router
,
2004,
USENIX Security Symposium.