![jondo java anon proxy jondo java anon proxy](https://www.windows7download.com/softwareimages/yyommjxl.png)
Tor is therefore susceptible to large-scale surveillance systems based on large server farms, with which a US secret service co-operates the anonymization network on a large scale. In comparison, everyone in the Tor network can provide their computer as an anonymization node. In theory, this model is safe even with complete monitoring of the underlying network. In contrast to some other anonymization services such as Tor, JonDo is based on the concept of fixed mix cascades. Since law enforcement authorities or other state institutions can enforce such cooperation between the mix operators, an international diversity of the mix operators in a cascade is also beneficial for anonymity.Īdvantages and disadvantages of the anonymization model Only when all the mixes in a cascade work together can the source IP addresses of the requests known only to the first mix be assigned to the requested websites known only to the last mix, so that all user actions are deanonymized. The anonymity towards the operators of the mixes, however, depends on the number of mixes in the cascade and the trust in their individual operators that they do not work together. More heavily used cascades thus create greater anonymity. You are anonymous to external observers within the user group of the same mix cascade. After the response packet has completely gone through the cascade backwards and has been passed from the first mix to the JonDo client, the latter decrypts the packet several times and then forwards the decrypted data to the application. The mixes encrypt the response data one after the other in the receiving direction with the respective secret key. The receiver sends response data to the last mix in the cascade. After the last mix has carried out this process, the plaintext data is visible to it (if there is no end-to-end encryption on it) and it sends it to the intended recipient. While this data now goes through the cascade, each mix decrypts this data with the secret key known to it. With these secret keys, the data to be sent is now encrypted several times and this multi-encrypted data is sent to the first mix of the cascade.
![jondo java anon proxy jondo java anon proxy](https://slidetodoc.com/presentation_image_h/1e0143b40b8ad734b02b3a0e1c7f6108/image-15.jpg)
For this purpose, the client exchanges its own secret key with each mix of the cascade, so that the individual key is only known to exactly one mix and the client. This client takes care of the communication with the mixes of the selected cascade - in particular, it takes over the necessary encryption. The user enters the local address of the JonDo client as a proxy server in the application to be anonymized (especially the web browser ).
#Jondo java anon proxy software#
JonDo is distributed as free software under the three-clause BSD license. After the state funding for the project ended in 2006, some project employees founded JonDos as a start-up company and thus continued the service.
![jondo java anon proxy jondo java anon proxy](https://slidetodoc.com/presentation_image_h/1e0143b40b8ad734b02b3a0e1c7f6108/image-10.jpg)
The service emerged from the Java Anon Proxy (since Java is a trademark of Sun Microsystems and could no longer be used, usually only the acronym JAP was used) of the AN.ON project, in which the Technical University of Dresden, the university Regensburg and the Independent State Center for Data Protection Schleswig-Holstein have researched. The name is a reference to John Doe - the English placeholder name for unknown people. JonDo is a web anonymizer that is being further developed by JonDos GmbH. Technical University of Dresden, University of Regensburg, JonDos