Anonymity in Networks I

Last semester I wrote a paper about the basics of anonymity in networks, especially the internet. The paper is publicly available, as I think academic papers should be as free, as possible. The paper originates from the proseminar “Network Hacking” at the TU Munich.


This paper introduces important terms related to anonymity, describes basic attacks on people’s identity in networks and proposes defense mechanisms.

Different use cases of networks need different approaches in anonymizing. Due to the need of real-time answers in some applications they have different requirements. Mixing and onion routing are concepts that try to create anonymity in networks. Various anonymizers use those techniques to provide anonymity for the purpose of — amongst others — sending E-mails, web browsing and chatting. Some of those porgrams are briefly depicted and compared, addressing problems and possible security breaches.

Anonymity in Networks I – Basics

Bash Example Script #2

I have added the following function to my bash example script:

# Run external command and only procced, when exit code is 0
function try {
	echo "$returnValue"
	if [ $returnValue -ne 0 ]
		log $ERROR "$@ exited with return value \
		$returnValue Script will stop here."
		echo "$@ exited with return value $returnValue. \
		Script will stop here."

The function takes a program as an argument and runs in. If the program returns with a status other then 0, so it fails, then the script will print an error message, log it and and exits. I needed this behaviour in some recent scripts and hope it to be usefull for everybody else.