|
JAP FAQFrequently asked questions about the JAP concept
ConceptI use JAP. Who can observe my surfing?
Your provider can only see that you are using the anonymization service. An encrypted channel is set up between JAP and the anonymization servers, over which your data is sent. All data requests in the browser that leave or arrive at your computer are therefore encrypted. A detailed description can be found under 'JAP and Encryption'. The only thing apparent at work is that you are using the anonymization service. An encrypted channel is set up between JAP and the JAP servers, over which your data is sent. All data requests in the browser which leave or arrive at your computer are therefore encrypted. A detailed description can be found under 'JAP and Encryption'. Of course, when surfing at work, one should be aware that the old "reading-over-your-shoulder" type of observation is just as easy with or without JAP. Browsers and operating systems on desktops often save data from recently visited websites, for example, in the address bar or in the Temporary Internet Files folder. This has the comfortable advantage of automatically completing typed addresses, but the disadvantage is that others who use the same computer or user account can very easily see where the last user surfed. This is the default setting in most browsers, but can be deactivated in the options menu. A mix provider can only determine a relationship between the incoming and outgoing connections to his mix server and must, in fact, do this to ensure that the data packets were correctly transferred. If the user uses a mix cascade consisting of more than one independently run mix, the mix provider of one single mix in the chain cannot determine a relationship between the user and the websites surfed. For this reason, we especially point out that the "Dresden-Dresden" mix cascade is for test purposes and is run solely by us. Whoever uses this mix is protected from external observation, but we (in Dresden) could theoretically observe. Do you save log files?No log files are kept at the anonymization service with the following exceptions:
Is there a way to trace criminal activity of a JAP connection?The law requires that telecommunications service providers retain for crime prevention purposes, data that they would save anyway. But no one is required to save data which does not need to be recorded or processed for the service.
Retroactive observation is nearly impossible: If someone wanted to uncover an internet connection after the person surfed, all incoming and outgoing messages from all mixes would have to be recorded. This would only make sense as long as the public key of the mix is valid. Not even the mix provider itself could decrypt old messages after changing keys, since the private key is destroyed. However, this feature is currently not yet implemented. How often the public key is changed is decided by the mix provider. Eventually, in a final version, this could even occur as often as every few hours. Online observation would require that every mix in a cascade immediately make a protocol of the ingoing and outgoing connection for a certain data message. The message to be tracked would have to be marked. Then it could be de-anonymized with all mixes in a cascade working together. This message marking could only be recognized by the mixes involved, and the process would work similarly to "trapping" an analog telephone line. In this way, it would be possible to monitor access to a specific website. A detailed description of criminal activity tracking can be found under "JAP and criminal activity". Couldn't the anonymization service be used by the government for control?In principle, any service could be used by the government for control and surveillance. For this reason, transparency, clarity, and trust of the service's function are vital to the user. Transparency and clarity are especially acheived by releasing the source code. Trust in the service's function should be acheived through the official declarations from the mix providers and our project partner, the "Unabhängige Landeszentrum für Datenschutz" (Independent National Center for Data Privacy) in Schleswig-Holstein. Since there is no central instance involved in the mix concept, all mixes involved in a cascade would need to work together in order to track a connection. Because of this, any kind of observation of the internet user, including from the side of the government, is not made easier, rather more difficult by using JAP. Of course, such anonymizers especially attract interest for surveillance. We are definitely aware that unobservable internet usage is for this reason especially important for users of the anonymization service. As a provider of anonymization service, we are well aware of the responsibility toward our users. Who makes sure that the mix providers hold to their official declarations?We have a partner in our project, the "Unabhängige Landeszentrum für Datenschutz" (Independent National Center for Data Privacy) in Kiel. They are responsible for this with their legal and technical competence. In the future, this should also be possible through further data privacy institutes. I use JAP, so do I still need other forms of protection for my computer and data?
Yes! JAP only anonymizes. It doesn't keep your data secret all the way to the receiver. An encrypted channel is set up between JAP and the JAP servers. This is done simply by calling up a website with "https" instead of "http". A detailed description can be found under "Jap and Encryption".If you don't use SSL, however, the data leaves the final server in a mix cascade unencrypted. In order for data to be sent encrypted from the anonymization service to the requested server, the server has to support encryption. This is done with the standard SSL protocol. Therefore, calling up websites with "https" instead of "http" is recommended for sensitive data. A detailed description can be found under "JAP and Encryption". JAP intentionally anonymizes the IP address only at the network level. Every user should decide for himself what other information he wants to hide. Since many people use the same operating system - browser combination, one is still anonymous within the set of JAP users with the same combination. Whoever filters out even more information, is likely to stick out of the crowd even more as someone who is trying to be anonymous. Many website authors create sites that are specially optimized for different browsers and therefore ask for browser type information. For this reason, we suggest another program (for example, various filter programs) for anonymizing this type of data. Some browsers (for example, Opera) can also be set to fake their type information. Yes! JAP only anonymizes your IP address for websites that you surf to. This doesn't mean that your IP address is masked in the internet, only that it's unknown which websites you visit. A firewall, on the other hand, protects your computer against attacks from the outside, and this is absolutely recommendable. Please note our instructions for configuring JAP when using a personal firewall. Why does frequent connecting and disconnecting of the internet connection reduce the level of anonymity?Someone observing your computer would know when you are connected to the internet or to the anonymization service. If this observer also observes the first mix in the anonymization service, he would see connections and disconnections there as well. He could then draw conclusions as to which user is visiting which website. Let us assume the following example:
The problem remains even with many users. Statistical averages can be made of people who were logged in at the same time. Thus it becomes relatively easy to determine who did what at what time. Am I also anonymous to web bugs?Yes, as long as you follow all the security tips. (deactivating active content) Is all data sent from my computer encrypted?Yes, all data leaving your computer is encrypted in multiple layers like an onion for the mix cascade used. JAP takes care of this for you. You can find a detailed description under "JAP and Encryption". But please note that data leaves the last mix in a cascade unencrypted if you don't use SSL. (Why?). Why is the mix service on a central server and not setup P2P?Some users suggest that each JAP user could simultaneously use JAP and act as a mix for other users. We've decided on mix cascades rather than mix nets (where users are free to choose their routes) for several reasons.
|
|
||||||||||
|
|
|||||||||||