[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] A possible solution to traffic correlation attacks,



June 6 2016 12:55 AM, "CANNON NATHANIEL CIOTA" <cannon@xxxxxxxxxxxxxxxxx> wrote:
> Another idea, if micro delays would not work out for low latency anonymizing
> networks such as Tor would be to perhaps add padding, randomized padding between each node. If
> micro-delays and/or padding is bad idea, then other solutions should be discussed.

IIRC, I2P does this to some degree now. They had Garlic routing from the beginning, but they've introduced padding, dummy traffic, exploratory tunnels, and random BitTorrent swarm traffic to help haystack potential target traffic.

I could be wrong, though. I'm just a kid with an interest in this stuff. I'm no engineer.
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk