Feeds

Censor-buster Peek-A-Booty goes public

P2P Proxy

  • alert
  • submit to reddit

The Power of One Infographic

CodeCon Peek-A-Booty, cDc's much vaunted anonymity app, is vaporware no more - it went public at the landmark CodeCon conference in San Francisco's DNA Lounge on Sunday.

Peek-A-Booty is designed to let surfers access sites blocked by government restrictions, and is essentially, a distributed proxy network. It uses a peer-to-peer model, masking the identity of each node. So the user can route around censorship that blocks citizens' access to specific IP addresses, because the censor doesn't know they're going there. If you're a Peek-A-Booty node, you might be doing it on their behalf. So the software isn't itself a browser, but simply requires the user to use localhost in the proxy field of their preferred browser.

Working out the general architecture was the easy bit. The tricky bit, explained cDc developers Paul Baranowski and Joey deVilla (and relax, they're happy to use their own names now), was anticipating and thwarting a wide variety of the attack measures, from outside or inside the Peek-A-Booty network itself. The design process took six months, beginning in July 2000, but coding only started in earnest six months ago, after a hiatus.

Peek-A-Booty nodes send out standard SSL, so the censorware can't distinguish the request from any other secure electronic transaction: the authors describe this as a form of steganography. But a rogue node inside such a network could harvest the addresses of all the other nodes, so Peek-A-Booty deploys a "virtual circuit", borrowing ideas from the Crowds anonymous web browser.

"Most P2P systems really want their nodes to be found, our problem is that you want to be found, but you really don't want to be found," said Baronowski. So Peek-A-Booty uses random forwarding based on probability - no one knows where the connection originated except the originator - and eschews time to live packets. For security, there's no attempt at initial discovery - you'll get sent details of a node by word of mouth, or from some other secure source. Baranowski and deVilla expect that citizens groups (NGOs) will become trusted servers. But as a one-time operation, you can use Peek-A-Booty to download Peek-A-Booty.

The demo - of version 0.75 running on Windows XP- showed off the web-based configuration management tool and the centerpiece, the Peekabear screen saver. Which is very cute. (We've been promised screenshots and will add them to this story as soon as they arrive).

Joey told us that the code was pretty standard Unix code (on the wxWindows [and not Cygnus Windows, as earlier reported] environment), so a Linux and even a Mac OS X port should be trivial. But Windows is on most desktops, and for Peek-A-Booty to work effectively - like SETI - it needs participating nodes, so that's where the numbers are.

It's a single threaded architecture right now, and grabs one link at time, but the authors say it runs pretty well on a low-end PII, and the demo proved this. "This will be fixed," they promise.

The pair are working on the code full time, so they need funding. There's a basic website, [note the .org TLD - there's erm, booty of the regular kind at the .com] but you'll need to mail the authors to get access to CVS tree.

The pair got a tremendous ovation from third day CodeCon attendees, and if it withstands attack, will be a boost for human rights. Bravo. ®

Related Stories

Censorware outfit targets cDc's anonymity app 'Peek-A-Booty'
Will cDc privacy app Peek-A-Booty put users at risk?

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.