Once again: Tor timing attacks and a Tor confession

Zenaan Harkness zen at freedbms.net
Mon Feb 29 00:27:44 PST 2016


On 2/29/16, Georgi Guninski <guninski at guninski.com> wrote:
> Is it theoretically possible at all to make low latency anonymity
> of sufficiently decent quality?

For those able to pay the price of fill traffic, possibly (theoretically).

However even in that case, you will need at least some level of trust
with your immediate peers (or high level of trust if your immediate
peer is singular, only 1, from which you access the rest of the
network).

Visibly stable fill traffic requires peers that don't collaborate with
the NSA - e.g., you can imagine how trivial it might be to put in
"bandwidth signals" if you are an untrustworthy peer - just a slight
temporary dip at a specific point in time, could be a signal to the
NSA.

Example peers:
- your ISP
- your neighbours in say a wireless or wired local mesh net

I am not aware of any academic research regarding the benefits and or
pitfalls of fill traffic.

I2P states fill traffic as one of their "todo" goals, and therefore
might be a good network to implement this on for testing and or
academic research.

Good luck.



More information about the cypherpunks mailing list