[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Riffle: an efficient communication system with strong anonymity



https://github.com/kwonalbert/riffle

Bastiani Fortress:
> Are there still no implementations yet?
> 
> 12:09 PM, August 2, 2016, Georgi Guninski <[email protected]>:
> 
>     On Tue, Jul 12, 2016 at 11:43:48AM +0300, Georgi Guninski wrote:
> 
>           On Mon, Jul 11, 2016 at 07:33:40PM -0400, grarpamp wrote:
>           > http://news.mit.edu/2016/stay-anonymous-online-0711
> 
>           Interesting. So far read only this (it is for dummies).
> 
>           Is riffle resistant to active timing attacks (possibly from internal
>           nodes)?
> 
>           Can sufficiently many malicious nodes cause total DOS? (I suspect they
>           will decrease performance at least).
> 
> 
>     Two days ago I spammed the authors of the Riffle paper with this, no
>     reply so far.
> 
>     My guess is it is vulnerable to active timing attacks, they are so
>     generic. Not sure at all jitter is solution.
> 
> 
> 
> 
> -- 
> Youâ??re not from the Castle, youâ??re not from the village, you are nothing. 
> Unfortunately, though, you are something, a stranger.
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20160817/9957cd79/attachment.sig>