The Design, Implementation and Operation of an Email Pseudonym Server. Mazières, D. & Kaashoek, F. M. November 1998.
The Design, Implementation and Operation of an Email Pseudonym Server [link]Paper  doi  abstract   bibtex   
Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on withstanding the former, but the threat of the latter is equally real. One particularly e$#$ective attack against anonymous servers is to abuse them and stir up enough trouble that they must shut down. This paper describes the design, implementation, and operation of nym.alias.net, a server providing untraceable email aliases. We enumerate many kinds of abuse the system has weathered during two years of operation, and explain the measures we enacted in response. From our experiences, we distill several principles by which one can protect anonymous servers from similar attacks.
@conference {nym-alias-net,
	title = {The Design, Implementation and Operation of an Email Pseudonym Server},
	booktitle = {Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS 1998)},
	year = {1998},
	month = {November},
	publisher = {ACM Press},
	organization = {ACM Press},
	abstract = {Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on withstanding the former, but the threat of the latter is equally real. One particularly e$\#$ective attack against anonymous servers is to abuse them and stir up enough trouble that they must shut down. This paper describes the design, implementation, and operation of nym.alias.net, a server providing untraceable email aliases. We enumerate many kinds of abuse the system has weathered during two years of operation, and explain the measures we enacted in response. From our experiences, we distill several principles by which one can protect anonymous servers from similar attacks.},
	isbn = {1-58113-007-4},
	doi = {10.1145/288090.288098},
	url = {http://portal.acm.org/citation.cfm?id=288098},
	author = {David Mazi{\`e}res and Frans M. Kaashoek}
}

Downloads: 0