[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #17067 [Tor]: useful cover traffic
#17067: useful cover traffic
---------------------+---------------------
Reporter: elypter | Owner:
Type: project | Status: new
Priority: normal | Milestone:
Component: Tor | Version:
Keywords: | Actual Points:
Parent ID: | Points:
---------------------+---------------------
if an adversary is sniffing between client and entry guard and between
exit relay and destination server he can do traffic correlation in both
directions. one way of hiding returning traffic could be to let the middle
relay send cover traffic to lets say 5 random entry guards as soon as it
recieves returning traffic. the entry guards send that traffic to one of
their clients. the adversary would not be able to know who of the 6 people
recieved data from that server. while still being a large amount of
overhead its not as much as maxing out all connections. for sending
traffic thats not as exit relays would have to send something to random
servers. instead the client upload bandwidth could be reduced and the
client could send constant low bandwith cover stream.
this cover bandwidth could then be used for many useful things like:
-provide a decentralized private cloud storage
-spread metadata and tor updates
-allow download content or embedded media on onion sites to be hosted in
an anonymous high lattency p2p network
-website archive
-mail service
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17067>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs