NeoChainDaily
NeoChainDaily
Uplink
Initialising Data Stream...
30.01.2026 • 05:35 Research & Innovation

Selective Deanonymization Proposed for Anonymity Networks

Global: Selective Deanonymization Proposed for Anonymity Networks

Researchers have introduced Seldom, an anonymity network that integrates selective deanonymization, allowing law‑enforcement agencies to access the identities of users who engage in illicit behavior while preserving the privacy of ordinary participants. The concept was detailed in a paper posted to arXiv in December 2024 and builds on the existing Tor infrastructure.

Design Framework and Governance

Seldom’s architecture requires that any request to reveal a user’s identity be approved by a consortium of impartial entities, ensuring that access rights are exercised only under defined circumstances. Each approved request is subsequently disclosed to the public, providing transparency without compromising ongoing investigations.

Technical Implementation on Tor

The prototype extends Tor’s routing mechanisms, adding encrypted identifiers and flow‑record storage. Evaluation results indicate that latency, processing time, and bandwidth consumption remain comparable to standard Tor operation, with the primary overhead arising from the storage of encrypted identifiers.

Performance and Storage Requirements

Simulations suggest that retaining encrypted identifiers for a network the size of Tor for a two‑year period would require approximately 636 TB of storage. The authors argue that this level of resource consumption is manageable for large‑scale deployments.

Balancing Privacy and Law Enforcement

By enabling selective access to misbehaving users, Seldom aims to deter criminal activity that exploits anonymity networks, while still offering robust privacy guarantees to law‑abiding citizens. The public disclosure mechanism is intended to prevent abuse of de‑anonymization powers.

Potential Limitations

The approach relies on the trustworthiness of the overseeing consortium and on the secure handling of large volumes of encrypted data. Critics may question the feasibility of maintaining impartiality and the risk of inadvertent exposure of benign users.

Future Directions

The authors conclude that selective deanonymization is technically viable and propose further research into governance models, scalability, and integration with other privacy‑preserving technologies.

This report is based on information from arXiv, licensed under Academic Preprint / Open Access. Based on the abstract of the research paper. Full text available via ArXiv.

Ende der Übertragung

Originalquelle

Privacy Protocol

Wir verwenden CleanNet Technology für maximale Datensouveränität. Alle Ressourcen werden lokal von unseren gesicherten deutschen Servern geladen. Ihre IP-Adresse verlässt niemals unsere Infrastruktur. Wir verwenden ausschließlich technisch notwendige Cookies.

Core SystemsTechnisch notwendig
External Media (3.Cookies)Maps, Video Streams
Analytics (Lokal mit Matomo)Anonyme Metriken
Datenschutz lesen