[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] The Aqua design (was: A possible solution to traffic correlation attacks)



On Sun, Jun 05, 2016 at 02:34:22PM -0400, grarpamp wrote:
> You need fulltime regulated fill traffic, within which, your traffic resides.

The Aqua design goes in that direction.  It is a traffic
analysis-resistant anonymity system for BitTorrent:
<https://research.microsoft.com/pubs/199302/sigcomm13-aqua.pdf>

It handles traffic at the network edges differently than the core, to
achieve low-latency resistance to traffic analysis.  At the edges, it
dynamically groups clients with similar usage patterns together to
provide k-anonymity.  The network core consists of nodes that exchange
constant-rate traffic that is padded when necessary.

However, Aqua cannot protect against long-term intersection attacks and
the authors haven't really thought about incentives for joining the
network; I could see the network only being used for illegal file
sharing, making it an attractive target for blocking with low collateral
damage.
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk