GPAs vs todays anonymous overlay networks

grarpamp grarpamp@gmail.com
Mon Apr 6 10:43:38 PDT 2015


On Mon, Apr 6, 2015 at 10:03 AM, Alexis Wattel <alexiswattel@gmail.com> .
> https://cpunks.org//pipermail/cypherpunks/2015-April/007186.html

> traffic analysis/correlation is not part of their threat model. The problem
> is that it is nowadays a definitely proven capability of adversaries.

> They say that randomized wait times at each relay would make the traffic too
> slow.

The delay parameters must be specified before using words like "too
slow[ed]" to describe the relative impacts to the full path. Further,
relevance to chosen application must be considered. Some users
do realtime HS2HS text/voice/video over it.

> The other solution, randomized length of packets with dummy padding
> discarded at each relay would impact even less on responsiveness.

Using a fixed length cell network and keeping links otherwise full of
chaff of said length is interesting defense to GPA correlation attack.
Random length cells, even if some cars are removed, still form a
uniquely identifiable train (particularly at entry/exit). Thus not useful.

> deliberate desire of keeping Tor at government's reach

[queue usual comments on funding, centralized dirauths, TCP
only, etc]

It's opensource, fork it.


More information about the cypherpunks mailing list