F2F UDP mesh net prototype proof of concept

Zenaan Harkness zen at freedbms.net
Mon Oct 21 00:41:07 PDT 2019


On Mon, Oct 21, 2019 at 06:28:01PM +1100, Zenaan Harkness wrote:
> On Sun, Oct 20, 2019 at 08:40:09PM -0300, Punk - Stasi 2.0 wrote:
> > 	3) virtual-circuit-switched, or packet-switched? Is packet switiching the most expensive and the most secure option? Packet size? 

Re circuit switching, Tor does what's called onion routing, using TCP
circuits per onion layer.

This means A connects to B with a (encrypted) TCP connection, and
requests of B a next hop connection to C.

So B decrypts A's first layer incoming connection, which contains
A's encrypted connection to C, and B forwards the packets of that
connection, on to node C.

This layered encryption means B cannot read the contents of A's
connection with C.

It also is supposed to mean that because A's initial connection to B
is effective double encrypted, external onlookers should not be able
to determine that A is connecting to C, only that A is connecting to
B, but in practice to actually deliver this promise would require an
effective chaff fill mechanism, to actually obfuscate when and how
much data A sends to B, etc.



More information about the cypherpunks mailing list