Hello, won't you tell me your name?: Investigating Anonymity Abuse in IPFS
- URL: http://arxiv.org/abs/2506.04307v1
- Date: Wed, 04 Jun 2025 17:54:56 GMT
- Title: Hello, won't you tell me your name?: Investigating Anonymity Abuse in IPFS
- Authors: Christos Karapapas, Iakovos Pittaras, George C. Polyzos, Constantinos Patsakis,
- Abstract summary: We explore methods that malicious actors can exploit IPFS to upload and disseminate harmful content while remaining anonymous.<n>We evaluate the role of pinning services and public gateways, identifying their capabilities and limitations in maintaining content availability.<n>Our analysis reveals that pinning services and public gateways lack mechanisms to assess or restrict the propagation of malicious content.
- Score: 5.751453679891771
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The InterPlanetary File System~(IPFS) offers a decentralized approach to file storage and sharing, promising resilience and efficiency while also realizing the Web3 paradigm. Simultaneously, the offered anonymity raises significant questions about potential misuse. In this study, we explore methods that malicious actors can exploit IPFS to upload and disseminate harmful content while remaining anonymous. We evaluate the role of pinning services and public gateways, identifying their capabilities and limitations in maintaining content availability. Using scripts, we systematically test the behavior of these services by uploading malicious files. Our analysis reveals that pinning services and public gateways lack mechanisms to assess or restrict the propagation of malicious content.
Related papers
- Minimally Intrusive Access Management to Content Delivery Networks based on Performance Models and Access Patterns [0.4949816699298336]
This paper focuses on combating the misuse of tokens through performance analysis and statistical access patterns.
We propose the definition of acceptable request limits to detect and block abnormal accesses.
We also introduce countermeasures against piracy, such as degrading the quality of service for pirate users to discourage them from illegal sharing.
arXiv Detail & Related papers (2024-10-08T02:45:22Z) - Robust Utility-Preserving Text Anonymization Based on Large Language Models [80.5266278002083]
Anonymizing text that contains sensitive information is crucial for a wide range of applications.<n>Existing techniques face the emerging challenges of the re-identification ability of large language models.<n>We propose a framework composed of three key components: a privacy evaluator, a utility evaluator, and an optimization component.
arXiv Detail & Related papers (2024-07-16T14:28:56Z) - "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models [74.05368440735468]
Retrieval-Augmented Generative (RAG) models enhance Large Language Models (LLMs)
In this paper, we demonstrate a security threat where adversaries can exploit the openness of these knowledge bases.
arXiv Detail & Related papers (2024-06-26T05:36:23Z) - Evaluating and Mitigating IP Infringement in Visual Generative AI [54.24196167576133]
State-of-the-art visual generative models can generate content that bears a striking resemblance to characters protected by intellectual property rights.
This happens when the input prompt contains the character's name or even just descriptive details about their characteristics.
We develop a revised generation paradigm that can identify potentially infringing generated content and prevent IP infringement.
arXiv Detail & Related papers (2024-06-07T06:14:18Z) - Peer2PIR: Private Queries for IPFS [4.88160756739524]
The InterPlanetary File System (IPFS) is a peer-to-peer network for storing data in a distributed file system, hosting over 190,000 peers spanning 152 countries.
Our work highlights and addresses novel challenges inherent to integrating PIR into distributed systems.
We present our new, private protocols and demonstrate they incur reasonably low communication and computation overheads.
arXiv Detail & Related papers (2024-05-27T16:09:25Z) - A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges [23.242281571096782]
Caching content at the edge network is a popular and effective technique widely deployed to alleviate the burden of network backhaul.<n>There has been some controversy over privacy violations in caching content at the edge network.
arXiv Detail & Related papers (2024-05-03T04:27:32Z) - GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware [8.576433180938004]
GuardFS is a file system-based approach to investigate the integration of detection and mitigation of ransomware.
Using a bespoke overlay file system, data is extracted before files are accessed.
Models trained on this data are used by three novel defense configurations that obfuscate, delay, or track access to the file system.
arXiv Detail & Related papers (2024-01-31T15:33:29Z) - SPAct: Self-supervised Privacy Preservation for Action Recognition [73.79886509500409]
Existing approaches for mitigating privacy leakage in action recognition require privacy labels along with the action labels from the video dataset.
Recent developments of self-supervised learning (SSL) have unleashed the untapped potential of the unlabeled data.
We present a novel training framework which removes privacy information from input video in a self-supervised manner without requiring privacy labels.
arXiv Detail & Related papers (2022-03-29T02:56:40Z) - DLPFS: The Data Leakage Prevention FileSystem [1.1454761108688085]
Data leaks caused by human error are regrettable common news.
We present Data Leakage Prevention FileSystem (DLPFS), a first attempt to systematically protect against data leakage caused by application or human error.
This interface provides a privacy protection layer on top of the POSIX interface, allowing for seamless integration with existing infrastructures and applications.
arXiv Detail & Related papers (2021-08-31T12:27:16Z) - NAS-FAS: Static-Dynamic Central Difference Network Search for Face
Anti-Spoofing [94.89405915373857]
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems.
Existing methods rely on expert-designed networks, which may lead to a sub-optimal solution for task FAS.
Here we propose the first FAS method based on neural search (NAS), called FAS-FAS, to discover the well-suited task-aware networks.
arXiv Detail & Related papers (2020-11-03T23:34:40Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.