This section holds general resources that we should all read. The list below is strongly
biased towards technical issues, since the workshop as a whole is, but it is
incomplete, and additions are strongly encouraged!
In particular, additions of useful resources in related categories might include, but are
certainly not limited to:
The resources on this page should be considered background reading. They may help to
inform opinions on the projects discussed in the workshop. There is no attempt here to
duplicate, for example, the extensive archives at the EFF,
EPIC, or any of many standards organizations. Depending on
popular opinion, this page might be divided into two lists: those that everyone in the
workshop should read, and background information that may or may not be useful but is
gathered here as a convenience. We may also make another listing of all
papers that have been submitted to the CFP Proceedings, or to the
TIS special issue.
(Papers contributed just to the workshop itself can be found
- The Freenet Project. This
project is trying to implement a censorship-proof, decentralized, anonymous document
store. This makes it possible to permanently post information or opinions that may
be unpopular or illegal in various jurisdictions. It's similar to the original idea
of the Eternity Service.
- The Crowds System.
This project helps make surfing web more anonymous, by causing HTTP fetches to act
like messages in an anonymous remailer and hence hiding the endpoints of the
This project attempts to find people with similar interests and aggregate them into
groups, so they may then talk one-to-one or to everyone in the group. It does so in
a decentralized, privacy-protecting fashion, so there is no central point to attack
with subpoenas or taps.
- The Internet's growing loss of transparency.
The impending exhaustion of IP addresses, in addition to NAT, Intranets, and
certain types of firewalls, is threatening the transparency of the
network -- as stated in RFC2775, "the original Internet concept of a single universal
logical addressing scheme, and the mechanisms by which packets may flow from source
to destination essentially unaltered." This loss of transparency threatens the
end-to-end performance of the network, and has potentially serious
consequences for the ability of IPSEC and other cryptographic technologies to do
their job in protecting the ends of a connection from interception in the
- Stefan Savage seems to be
working on some projects that may be useful for the DNS
project, or at least for making the underlying network infrastructure more reliable
in general; see in particular his paper on
where the packets in a distributed denial-of-service attack may be coming from
and perhaps also the papers on STING (a TCP-based network measurement tool that
doesn't require cooperation at the other end) and the paper on TCP congestion
control (which penalizes bad actors instead of, as is currently the case, rewarding
them); both are available here.
Papers contributed to the workshop can be found
in the listing on the main conference program.
Last modified: Thu Apr 13 18:15:24 EDT 2000