2015
DOI: 10.1515/popets-2016-0011
|View full text |Cite
|
Sign up to set email alerts
|

Mailet: Instant Social Networking under Censorship

Abstract: Social media websites are blocked in many regimes where Internet censorship is applied. In this paper, we introduce Mailet, an unobservable transport proxy which enables the users to access social websites by email applications. Without assuming the Mailet servers are trustworthy, Mailet can support the services requiring privileges without having the complete credential. Particularly, the credential is split and distributed in two Mailet servers, and neither of them can recover the credential alone. To recove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…The controller would thus confirm DR flows by matching the content of TLS ClientRandom in ClientHello (of potential DR flows), to the one received in the email. On the use of email: In the past, email has been successfully used as a covert channel for transporting censored content [32,36,37,41]. Similar to such efforts, we also assume that users have access to some form of TLS supported email (either webmail or regular SMTPS).…”
Section: Improved Covert Signallingmentioning
confidence: 99%
See 1 more Smart Citation
“…The controller would thus confirm DR flows by matching the content of TLS ClientRandom in ClientHello (of potential DR flows), to the one received in the email. On the use of email: In the past, email has been successfully used as a covert channel for transporting censored content [32,36,37,41]. Similar to such efforts, we also assume that users have access to some form of TLS supported email (either webmail or regular SMTPS).…”
Section: Improved Covert Signallingmentioning
confidence: 99%
“…Thus, even if one email ID is spammed, clients can use other email IDs to access DR service. Additionally, similar to Mailet [41], we can also enforce usage limitations on clients or can use Captcha [55] and/or puzzles. d) Fake Sessions Attack: As a more sophisticated attack, the adversary could send the controller "legitimate-looking" emails, which set up decoy routing sessions with random source IP addresses and ISNs.…”
Section: ) Dos Attacksmentioning
confidence: 99%
“…Mailet. Li and Hopper design a secure computation protocol for TLS GCM and use it to realize a censorshipcircumvention system named Mailet [39]. As in our setting, they have a client and proxy that jointly compute a TLS record to allow authentication to a remote server (Twitter in the case of Mailet).…”
Section: Related Workmentioning
confidence: 99%
“…In §2, we analyze previously proposed censorship-resistant systems for their ability to achieve behavioral realism and behavioral independence and find that no previous system simultaneously achieves both properties. In §3, we further motivate the importance of considering protocol behavior and demonstrate how previous email-based censorship-resistant systems that do not provide behavior independence [38,42] can be trivially detected through traffic analysis. We present the results from a novel internet measurement of the accessibility of email protocols in censored regions in §4.1, wherein we find that out-of-country email connections are allowed to some degree for all tested countries.…”
Section: Introductionmentioning
confidence: 99%
“…Raven supports covert interaction with TLS-based services through the use of Intel processor Software Guard Extensions (SGX) [3]. More specifically, Raven enables secure, delay-tolerant TLS communication with Twitter, an established use-case for censorship circumvention tools [42,59]. In particular, Twitter has become a recent target of state-sponsored censorship activity as governments attempt to control the flow of information on their networks [76], and Raven could be used to combat these efforts.…”
Section: Introductionmentioning
confidence: 99%