Hidden service persistent connections (Traffic Analysis)
jamesd at echeque.com
jamesd at echeque.com
Mon May 20 18:41:25 PDT 2019
Any sort of live interaction, like that provided by Tor, is going to be
traceable, but most of this stuff does not really need live interaction.
It could be provided by something that works like email.
To prevent traceability, needs a big pile of stuff sitting on the nodes,
rather than the nodes retransmitting immediately.
To defeat traffic analysis, needs data mingling. Any large object needs
to be encrypted, chopped into small blocks, each identified by it hash,
the blocks sent with an outer layer of encryption into a great big pile
somewhere with the outer layer of encryption pulled off, and you then
some considerable time later, fish them out of the great big pile.
This, of course, requires that you trust the operator of the great big
pile, who knows where an opaque block came from and where it is going
to, so you need multiple piles, and stuff gets distributed from pile to
pile.
For automated interactions, like the dark web selling cocaine, you would
send a request, and much later a form would be in your inbox, like email
with emails running javascript in a sandbox. When you eventually got
around to working your through your inbox, you would fill out the form,
hit send, and eventually get a possibly automated response.
Last I heard, javascript in email was not properly sandboxed, and
represents a massive security hole.
More information about the cypherpunks
mailing list