Riffle: an efficient communication system with strong anonymity

Peter Bourgelais peter.bourgelais at gmail.com
Wed Aug 17 10:47:00 PDT 2016


https://github.com/kwonalbert/riffle

Bastiani Fortress:
> Are there still no implementations yet?
> 
> 12:09 PM, August 2, 2016, Georgi Guninski <guninski at guninski.com>:
> 
>     On Tue, Jul 12, 2016 at 11:43:48AM +0300, Georgi Guninski wrote:
> 
>           On Mon, Jul 11, 2016 at 07:33:40PM -0400, grarpamp wrote:
>           > http://news.mit.edu/2016/stay-anonymous-online-0711
> 
>           Interesting. So far read only this (it is for dummies).
> 
>           Is riffle resistant to active timing attacks (possibly from internal
>           nodes)?
> 
>           Can sufficiently many malicious nodes cause total DOS? (I suspect they
>           will decrease performance at least).
> 
> 
>     Two days ago I spammed the authors of the Riffle paper with this, no
>     reply so far.
> 
>     My guess is it is vulnerable to active timing attacks, they are so
>     generic. Not sure at all jitter is solution.
> 
> 
> 
> 
> -- 
> You’re not from the Castle, you’re not from the village, you are nothing. 
> Unfortunately, though, you are something, a stranger.
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20160817/9957cd79/attachment-0003.sig>


More information about the cypherpunks mailing list