PriFi  (Privacy-Preserving Wi-Fi) is an anonymous communication network, co-developped at EPFL and Yale University. It provides protection against tracking attacks and against traffic analysis, and protects your employees from parking-lot attacks, from eavesdropping by a rogue employee, and from malware.
Compared to Tor , PriFi provides lower latency, better anonymity, and is tailored for WLANs and LANs.
Get PriFi : github.com/lbarman/prifi
PriFi is under active development; feel free to contact us if you want to contribute !
What PriFi provides
- Strong anonymity between the users of a PriFi network (typically, the members of an organization or a company).
- Tracking protection against parking-lot attacks, rogue employees and malware eavesdropping on the network.
- Protection against equivocation attacks.
How it works
PriFi is built upon Dining Cryptographer networks , a cryptographic primitive that provides provable anonymity.1 It is tailored for WLANs and LANs, hence it works best at your company, on your university campus, or in your home. PriFi is like a VPN, but does not need to be trusted. Install it on your users computers, and it transparently anonymizes any kind of traffic.
PriFi uses a client-server infrastructure for performance and security. It relies mostly on existing infrastructure : a relay/router, a set of clients, and some additional public servers, possibly shared among several organizations.
These servers provide security; the first interesting property is their security model, called anytrust . It means that as long as any one of the selected servers is honest, PriFi will keep its security guarantees. In practice, your organization can select a set of servers it trusts; these servers can become compromized, but as long as not all of them are compromized, PriFi will deliver strong anonymity.
The second interesting property is the path taken by the data: Unlike Tor and other mixnets, the anonymized data does not go through the servers. This is important because the latency to these servers is usually orders of magnitude above the latency in a WLAN/LAN; In PriFi, this high-latency path matters only at the setup. Once the setup phase is complete, the packets from the clients to the Internet follow their usual path, with no added hop that would increase latency.
1 This construction provides perfect anonymity; in particular, it is resistant to traffic-analysis attacks , unlike Tor (and other systems). These attacks exploit the differences in traffic flows among users, and these differences are an effective way to de-anonymize users.
Prof. Bryan Ford
Prof. Joan Feigenbaum
Prof. Jean-Pierre Hubaux
- github.com/lbarman/prifi_dev used for the source code of PriFi.
- github.com/lbarman/prifisim_dev used for the simulator PriFi-Sim.
- git.epfl.ch/repo/prifi.git used for the papers and presentations.
Request access to: Italo, or Ludovic.
-  Barman, Ludovic; Zamani, Mahdi; Dacosta, Italo; Feigenbaum, Joan; Ford, Bryan; Hubaux, Jean-Pierre and Wolinsky, David. PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society
-  Dingledine, Roger; Mathewson, Nick and Syverson, Paul. Tor: The second-generation onion router.
-  Chaum, David. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of cryptology
-  Wolinsky, David I; Corrigan-Gibbs, Henry; Ford, Bryan and Johnson, Aaron. Scalable anonymous group communication in the anytrust model.
-  Raymond, Jean-François. Traffic analysis: Protocols, attacks, design issues, and open problems. Springer
-  DeDiS Lab, EPFL. Secure Distributed Algorithm. https://github.com/dedis/cothority