Campus Access Only

All rights reserved. This publication is intended for use solely by faculty, students, and staff of University of the Pacific. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, now known or later developed, including but not limited to photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the author or the publisher.

Date of Award


Document Type

Thesis - Pacific Access Restricted

Degree Name

Master of Science (M.S.)



First Advisor

Jeffrey Schafer

First Committee Member

Chadi Kari

Second Committee Member

Emma Hayes


People all around the world have their internet access censored or monitored by governments or large corporations. Whistleblowers and human rights activists oftentimes need to communicate in secret to avoid persecution by the powerful organization monitoring their communications. Current anonymity systems often depend on the public internet, and as such are subject to some degree of interference. Cloak is a textual communication network created to hide the existence of the network itself from an outside observer, such as a repressive government or corrupt corporation. Cloak does not use the public internet, and as such would evade the majority of the monitoring in place today. Cloak also does not use any special infrastructure or create its own infrastructure, minimizing the risk of infrastructure attacks. Finally, Cloak provides plausible deniability for its users should they be investigated. Cloak works by hiding its messages inside of normal phone activity. Two Cloak nodes can identify each other by looking at wifi probe messages that are generated by phones in the vicinity of an open wifi hotspot. They can then connect to the hotspot and browse like normal, while hiding messages inside their browsing. Because this is open wifi, the other nodes can see the hidden messages and store them, and carry them closer to their destination. Cloak can hide its messages in a lot of ways. It can first send images with messages embedded in them. It can also use places where a website asks for data in a opaque format, such as YouTube video ids. Finally, if encrypted browsing is available, a Cloak node can just send the encrypted message and act like something went wrong with its encrypted browsing.





To access this thesis/dissertation you must have a valid email address and log-in to Scholarly Commons.

Find in ProQuest



If you are the author and would like to grant permission to make your work openly accessible, please email


Rights Statement

Rights Statement

In Copyright. URI:
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).