JAP -- ANONYMITY & PRIVACY

Table of Content

Tor

This panel is only available in Expert View and only in the beta version. To get to this settings window press the button Settings in the main window of JonDo, then choose the entry Services and open the tab Tor.

Tor versus JonDonym

On this page you can find information and settings concerning access to the Tor anonymization network. Since the advantages and disadvantages of Tor versus JonDonym are a point of interest to many users, we will do a small comparison of both services here.

Tor is an anonymization service that uses a method called Onion Routing, whereas JonDonym/AN.ON are based on the Mix Method . Both methods are very similar when it comes to the cryptographic processing of the data (multiple encapsulated encryption), but they differ in how the data gets relayed to the receiver. While in Onion Routing the actual way that the data packets take through the anonymization network changes quite often, in a Mix Method it is fixed. This is supposed to better spread the traffic load to multiple onion routers, while a mix service transfers all the traffic load to only a few intermediaries, the so-called mixes. The Tor network consists of a multitude of onion routers, the so-called Tor nodes. The individual Tor node does not have to fulfill high standards concerning network connection, memory and computing capacity since the whole load is spread across the Tor network. Compared to that, JonDonym only comprises a few mixes that are connected in fixed mix cascades. These few mixes have to carry the whole traffic load. The mixes therefore need substantially more resources than Tor nodes, and the operation of a mix means significantly more effort and cost.

Because of this difference many users notice the following thing: while in Tor the IP address changes with every new route as the last Tor node changes too, it remains the same for a long period of time in JonDonym, as one usually remains connected to the same cascade for a long period of time. From there many users draw an incorrect conclusion: "The more often my IP changes, the better my security will be." But in fact, changing an IP does not bring about better protection from traffic analysis. What matters is only that the visible IP can not be traced back to the original IP. Through multiple encryption of data both, JonDonym and Tor, offer strong unlinkability, no matter whether the visible IP changes often or not.

The discussion about which of the two methods is "better" is heavy and has not brought about any definitive result yet. It is known that mix services lead the score when it comes to security with respect to the organization of the service. Tor is susceptible to internal attackers, i.e. an operator of a Tor node could not be trustworthy and conduct attacks himself. Still, both Tor and JonDonym consider this scenario since in both cases a single trustworthy mix or tor node will suffice to guarantee the security of the users. However, a manageable number of mix operators also makes it easier to control them, bind them to contracts and to sanction them if a contractual obligation has been failed. In JonDonym it is basically organized this way. Tor on the other hand offers the possibility of operating your own Tor node and expanding the Tor network to any Internet user without having to fulfill such terms or even whole contracts. A Tor user can thus not readily assess whether his data is sent through trustworthy intermediaries. Therefore, Tor is not suitable for commercial use and can not give as many guarantees as JonDonym can with respect to security and speed.

Access to the Tor network with JonDo

JonDo has Tor support, but it is experimental. This is why we do not guarantee complete or flawless functionality. If you would like to use JonDo to access the Tor network, you will need to enter JonDo as a SOCKS (not as a HTTP/HTTPS) proxy in your browser.
  • Activate
    Using Tor with JonDo is still experimental. Deactivating this checkbox will result in prevention of accidental usage of Tor as well as less memory usage by JonDo.

  • Available Tor nodes
    This tab shows systems that are a part of the Tor network and offer a connection to the Tor network.

  • Reload
    This button reloads an updated list of currently accessible Tor nodes.

  • Preferences for anonymous routing

    • Minimum nodes per connection
      Here you can set the minimum number of Tor nodes through which a connection should be routed before being sent to the destination computer. The more nodes you use, the more effective the anonymization of the connection will be.

    • Maximum nodes per connection
      This slider sets the maximum number of Tor nodes used for a connection. The larger this number, the slower the connection will be.

    • Change route every x connections
      Here you can set how often a new route should be established. Whenever the threshold of connections has been reached, the old route is discarded and a new route through the Tor network is established.

    • Create anonymous route at startup
      If this box is checked, JonDo automatically establishes a route through the Tor network at startup. If unchecked, a route is not established until a connection is demanded for the first time.


Table of Content

 

Download

Stable Version
00.20.001


Beta Version
00.20.010


InfoService

Status of available AN.ON services and information about them.


Aktuell / News

Restrictions for the Dresden (JAP) anonymisation servers
After careful consideration we have decided to restrict the size of downloads over the Dresden (JAP) mixes a little. The reason is to allow a more fair use of scarce resources of our servers especially for users who simply want to surf the Web. more...

 

 
---