JonDonym - Stay Anonymous Online

JonDonym
 JonDonym which is also known as Java anon proxy or Japp is another anonymizing service that consists of three components. The first is the custom and hardened Firefox browser called JonDoFox. You can basically use any browser with the JonDo or JonDonym network but I recommend using the browser they provide or you could use the Tor browser if you configure the proxies correctly. Same if you want to use your own browser you have to set up the proxies correctly but it is recommended that you use their hardened browser, and the browser is available for Mac Windows and Linux. The second of the three components is the IP changer which is a free open source proxy program written in Java that you install or you place on your device and it looks like this here
 
JonDonym ip changer

And your browser will be configured to send its traffic through this piece of software/proxy because this is written in java you will need Java installed. But again because it is Java this makes it platform independent so runs on Mac Windows Linux. With the browser, you use you will need to point it at this proxy on 127.0.0.1:4001. Both the IP changer and JonDoFox will run without installation so are standalone which is great and the third component is the JonDonym network which you can see here-

JonDonym cascades

It is a mix based anonymity system currently comprising of around 20 mixing servers called mixers. In the above screenshot, we can see 6 premium cascades with three mixes each and if we hover over it you can see the three mixers for that particular cascade. There is also a free Cascade but notice that it only has two mixers and while the premium service supports TCP and UDP and free support TCP only. The mixing provides anonymity through unpredictable randomization of traffic through these fixed cascades of anonymizing mixes. In each mix, it will delay incoming packets from multiple user clients or adjacent mixes for random periods of time and then forward those in a randomized order and the mixes stripped layers of encryption to anonymize traffic from non-adjacent mixers.
Unlike Tor, JonDonym is a closed system so each of the mixes are trusted nodes or considered to be trusted nodes and this is because they have to be verified and certified by JonDo's company called GmbH who are the people that are running the network. The cascades are also established through negotiation among mix operators and the operators have to abide by a strict set of rules which governs how they can operate the mixers prohibiting them from saving connection data or exchanging such data with other operators.

JonDonym mix operators

The operators are independent and unrelated entities or private individuals whose identities are published therefore the barrier to becoming a mix operator is high. Given this oversight by the community of trusted Mix operators and if we want to draw a comparison with the tor network there is no such process for operators of tor relays, the network is run by volunteers from all over the world and there is no formal process to apply as a tor relay and no requirement to provide contact information. In fact, anyone can download the Tor software and become a relay. It is known that some tor relays will be bad actors performing co-relation attacks and sniffing traffic before it leaves the network. But in this comparison given the JonDonym oversight it should be difficult for an adversary to take over a mixer or cascade as they are spread over multiple countries and jurisdictions and there is the oversight for becoming a mixer and to continue the comparison Tor does have some manual oversight of the network and when malicious behavior is spotted bad actors are removed which is a constant task. JonDonym doesn't suffer this level of constant possible attacks, so unlike Tor and VPNs each mix participates in just one cascade and so each cascade has a static pair of entry and exit IP addresses as do one hop VPN services.

So the JonDonym user anonymity ultimately relies on the mix operator's integrity and discretion and on their ability to prevent adversaries from observing compromising or manipulating their servers much the same and comparable to the VPN service in that way. You can see below what JonDonym says about law enforcement

JonDonym law enforcement

And they also have a short report of all surveillance actions that were taken and reported by mix operators as shown below

JonDonym law enforcement


So that gives you an idea of the sort of issues that law enforcement have if they want to attempt to deanonymize users they require the cooperation of several states and organizations 

Interesting Reads : The Golden Rules of OPSEC | Learn about Tor Bridges

JonDonym - Stay Anonymous Online JonDonym - Stay Anonymous Online Reviewed by Admin on March 29, 2020 Rating: 5

No comments:

Theme images by Barcin. Powered by Blogger.