Statements (60)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:television_channel
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:David_Chaum
|
gptkbp:based_on |
cryptographic primitives
|
gptkbp:designed_by |
gptkb:David_Chaum
|
gptkbp:developed_by |
cryptographers
the 1980s enhancing user privacy protecting user identity |
gptkbp:enemy |
traffic analysis
|
https://www.w3.org/2000/01/rdf-schema#label |
Mixnet
|
gptkbp:is_adopted_by |
gptkb:political_movement
whistleblowers |
gptkbp:is_compared_to |
VP Ns
|
gptkbp:is_considered_as |
a tool for freedom of expression
a countermeasure against surveillance a foundational technology for privacy a method for anonymous browsing a solution for censorship resistance |
gptkbp:is_criticized_for |
complexity
potential latency issues |
gptkbp:is_evaluated_by |
gptkb:academic_research
real-world scenarios privacy assessments |
gptkbp:is_explored_in |
computer science literature
cryptography literature government policy discussions privacy conferences network security literature |
gptkbp:is_implemented_in |
email services
various cryptographic protocols |
gptkbp:is_influenced_by |
previous anonymity systems
|
gptkbp:is_part_of |
digital rights advocacy
the digital rights movement privacy technology the dark web the evolution of internet technologies the field of privacy engineering the fight for digital privacy the future of internet privacy the landscape of cybersecurity |
gptkbp:is_related_to |
gptkb:software_framework
gptkb:Tor_network data anonymization techniques secure multiparty computation onion routing |
gptkbp:is_supported_by |
academic institutions
privacy advocates various NG Os |
gptkbp:is_used_for |
privacy-preserving communication
|
gptkbp:is_used_in |
gptkb:political_movement
gptkb:newspaper financial transactions political activism data protection strategies peer-to-peer networks secure messaging applications |
gptkbp:provides |
receiver anonymity
sender anonymity |
gptkbp:utilizes |
mixing techniques
|