tor stinks, take #376029

Punk-Stasi 2.0 punks at tfwno.gf
Wed Nov 13 18:28:55 PST 2019


On Thu, 14 Nov 2019 12:06:19 +1100
Zenaan Harkness <zen at freedbms.net> wrote:

> On Wed, Nov 13, 2019 at 07:06:26PM -0300, Punk-Stasi 2.0 wrote:
> > https://www.freehaven.net/anonbib/cache/active-pet2010.pdf
> > 

> 
> Here are some possible network topologies/ connection models, which
> may (or may not) provide any such improvement:
> 
> 
>   - split connections / connection bonding / massive micro routes etc
> 
>     - enter the network, and access network and data/cache resources,
>       through some number of simultaneous routes, rather than only
>       one


	the article I linked and a few others describe some systems that use redundant routes, lookups and the like to avoid attacks by compromised nodes. Not sure yet if any of them actually work or just academic garbage.





More information about the cypherpunks mailing list