Re: [arch-d] Hiding in crowds
William_J_G Overington <wjgo_10009@btinternet.com> Tue, 24 May 2022 21:37 UTC
Return-Path: <wjgo_10009@btinternet.com>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BE3CC2B551D for <architecture-discuss@ietfa.amsl.com>; Tue, 24 May 2022 14:37:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=btinternet.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dq2UUho32opo for <architecture-discuss@ietfa.amsl.com>; Tue, 24 May 2022 14:37:47 -0700 (PDT)
Received: from sa-prd-fep-044.btinternet.com (mailomta18-sa.btinternet.com [213.120.69.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A59A7C2B551C for <architecture-discuss@ietf.org>; Tue, 24 May 2022 14:37:46 -0700 (PDT)
Received: from sa-prd-rgout-005.btmx-prd.synchronoss.net ([10.2.38.8]) by sa-prd-fep-044.btinternet.com with ESMTP id <20220524213744.FYYJ3230.sa-prd-fep-044.btinternet.com@sa-prd-rgout-005.btmx-prd.synchronoss.net>; Tue, 24 May 2022 22:37:44 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btinternet.com; s=btmx201904; t=1653428264; bh=FbpDWQtWygKF4/gPkR2mhSP5kuRiT7EsKkif1neA14U=; h=To:Cc:Message-ID:In-Reply-To:References:Subject:MIME-Version:From:Date; b=CWgJEM+cSPnhxbfiKYpgUzvEmXeOiIiOhXjujr/l4BrdiejizHffwTORGJWeLDNdc0aJPFqCTwI/ega1PkWYCYSnkeLTYBOc8kS5G8sl/SfjFP2vLQLeHHRrwMXec2BP/emKzYrdc+qXU8zpOWAag9va+9LnySDAJ2oDCTmWybl6QPRuHgKF1Toz3rrUrga5uHn2I8l2n7LOOl8tUfMqZs16AQgg0tAwXZ/z1/alGs4PMz+dNWgKPcibEeapHN5pn7GNJokCvGyQstV1Bc0xV3DKxDPtMt1rUdd4jPqZ0g9oeyedf5lH5ap0hQ+1hgpXdATMC8lPv72yfjxb5vQqEg==
Authentication-Results: btinternet.com; none
X-SNCR-Rigid: 6139452E25C4A396
X-OWM-Env-Sender: wjgo_10009@btinternet.com
X-VadeSecure-score: verdict=clean score=0/300, class=clean
X-RazorGate-Vade: gggruggvucftvghtrhhoucdtuddrgedvfedrjeegucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuueftkffvkffujffvgffngfevqffopdfqfgfvnecuuegrihhlohhuthemuceftddunecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefvvefkjghfufggtggfihfhffesrgdtregstderjeenucfhrhhomhephghilhhlihgrmhgplfgpifcuqfhvvghrihhnghhtohhnuceofihjghhopgdutddttdelsegsthhinhhtvghrnhgvthdrtghomheqnecuggftrfgrthhtvghrnhepvdefleekhfduhfehgfegudeffffgveekvdeggedtheetvdfgfeevtddvffekgfejnecuffhomhgrihhnpehivghtfhdrohhrghenucfkphepuddtrddvrdefkedruddukedpuddtledrudehfedruddufedrjeeknecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehhvghlohepshgrqdhprhguqdhugihfvghpqddtfeejrdgsthhmgidqphhrugdrshihnhgthhhrohhnohhsshdrnhgvthdpihhnvghtpedutddrvddrfeekrdduudekpdhmrghilhhfrhhomhepfihjghhopgdutddttdelsegsthhinhhtvghrnhgvthdrtghomhdpnhgspghrtghpthhtohepgedprhgtphhtthhopegrrhgthhhithgvtghtuhhrvgdqughishgtuhhsshesihgvthhfrdhorhhgpdhrtghpthhtohephhhuihhtvghmrgeshhhuihhtvghmrgdrnhgvthdprhgtphhtthhopehmnhhothesmhhnohhtrdhnvghtpdhr tghpthhtohepfihjghhopgdutddttdelsegsthhinhhtvghrnhgvthdrtghomh
X-RazorGate-Vade-Verdict: clean 0
X-RazorGate-Vade-Classification: clean
X-SNCR-hdrdom: btinternet.com
Received: from sa-prd-uxfep-037.btmx-prd.synchronoss.net (10.2.38.118) by sa-prd-rgout-005.btmx-prd.synchronoss.net (5.8.716.04) id 6139452E25C4A396; Tue, 24 May 2022 22:37:44 +0100
Received: from [109.153.113.78] by email.bt.com with HTTP; Tue, 24 May 2022 22:37:44 +0100
To: Christian Huitema <huitema@huitema.net>, Mark Nottingham <mnot@mnot.net>, "architecture-discuss@ietf.org" <architecture-discuss@ietf.org>
Message-ID: <6c94a421.2c234.180f8011e57.Webtop.118@btinternet.com>
In-Reply-To: <166d5658-ab22-5abd-bfb9-8ee49a070978@huitema.net>
References: <166d5658-ab22-5abd-bfb9-8ee49a070978@huitema.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_1351246_1676284334.1653428264527"
User-Agent: OWM Mail 3
X-SID: 118
X-Originating-IP: [109.153.113.78]
From: William_J_G Overington <wjgo_10009@btinternet.com>
Date: Tue, 24 May 2022 22:37:44 +0100
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/2-o7oP2fNyT6ZWO8nsjFth7imyE>
Subject: Re: [arch-d] Hiding in crowds
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 May 2022 21:37:51 -0000
Hi I don't know if this is relevant, but when I saw the question, > What kind of business model fosters a network of medium size services > without aggregating into a much smaller number of very large > providers? I thought of Letterpress Private Presses Then I extended that to Artists, printmakers, designers of art cards, letterpress private presses. With each of those, the distinctiveness between each person's work is what is of appeal. If they all worked as one team and produced one line of products, the essence of what exists now would be lost. So can each service each have its own distinctiveness such that those distinctivenesses keep aggregation away? William Overington Tuesday 24 May 2022 ------ Original Message ------ From: "Christian Huitema" <huitema@huitema.net> To: "architecture-discuss@ietf.org" <architecture-discuss@ietf.org>; "Mark Nottingham" <mnot@mnot.net> Sent: Tuesday, 2022 May 24 At 06:10 Subject: [arch-d] Hiding in crowds Mark as written a very good description of centralization issues in the "internet-centralization" draft. I believe once that is published, it may well motivate new studies. The one such study i think of is "hiding in crowds", an attitude found in many privacy-oriented architectures. Onion routers come to mind: if a single participant was using the onion network, her traces would be very easy to track. But if the traces of a large number of participants mix into the onion network, her traces become as hard to track as footprints on a crowded beach. The onion routers alone do not provide privacy, the crowd using the onion does. The same effect is at play when a crowd of services use ESNI and hide their identity behind a single fronting server, or when a crowd of DNS clients route their encrypted request through a big recursive resolver. But these two examples clearly show the tension between centralization and hiding in crowds. If the privacy guarantees are only effective when going through the same services as a large crowd, privacy seekers are motivated to use centralized solution. Why use ESNI and hide behind a boutique front-end when Cloudflare would hide the service in a large crowd? Why use a small non-profit DNS resolver when a crowd is already using Google DNS? But then, if maximum concentration provides the biggest crowds, it also provide huge risks. So, what to do? We can try placing a relay in front of the service, like oblivious DNS proposes for DNS. The relay would hide some of the metadata, and perhaps limit the exposure of information to the concentrated server. But the relaying service needs a crowd of users to provide privacy, which means that we will probably see concentration there too. Or we could try threading the needle, using services that are "just big enough" to provide a hiding crowd, but avoid the extreme bigness of concentration. Which seems like a weirdly unstable combination, unless maybe some kind of economic construct that supports such services and also supports entry of new actors. And no, I am not thinking of the blockchain for that. But I keep thinking of economics there. What kind of business model fosters a network of medium size services without aggregating into a much smaller number of very large providers? What kind of network architecture would support such deployment models? -- Christian Huitema _______________________________________________ Architecture-discuss mailing list Architecture-discuss@ietf.org https://www.ietf.org/mailman/listinfo/architecture-discuss <https://www.ietf.org/mailman/listinfo/architecture-discuss>
- [arch-d] Hiding in crowds Christian Huitema
- Re: [arch-d] Hiding in crowds Eliot Lear
- Re: [arch-d] Hiding in crowds Vittorio Bertola
- Re: [arch-d] Hiding in crowds Miles Fidelman
- Re: [arch-d] Hiding in crowds William_J_G Overington
- Re: [arch-d] Hiding in crowds George Michaelson
- Re: [arch-d] Hiding in crowds Stephen Farrell
- Re: [arch-d] Hiding in crowds Christian Huitema
- Re: [arch-d] Hiding in crowds David Conrad
- Re: [arch-d] Hiding in crowds Christian Huitema
- Re: [arch-d] Hiding in crowds Antoine FRESSANCOURT
- Re: [arch-d] Hiding in crowds Christian Huitema
- Re: [arch-d] Hiding in crowds Eliot Lear