[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Riffle: an efficient communication system with strong anonymity
https://github.com/kwonalbert/riffle
Bastiani Fortress:
> Are there still no implementations yet?
>
> 12:09 PM, August 2, 2016, Georgi Guninski <[email protected]>:
>
> On Tue, Jul 12, 2016 at 11:43:48AM +0300, Georgi Guninski wrote:
>
> On Mon, Jul 11, 2016 at 07:33:40PM -0400, grarpamp wrote:
> > http://news.mit.edu/2016/stay-anonymous-online-0711
>
> Interesting. So far read only this (it is for dummies).
>
> Is riffle resistant to active timing attacks (possibly from internal
> nodes)?
>
> Can sufficiently many malicious nodes cause total DOS? (I suspect they
> will decrease performance at least).
>
>
> Two days ago I spammed the authors of the Riffle paper with this, no
> reply so far.
>
> My guess is it is vulnerable to active timing attacks, they are so
> generic. Not sure at all jitter is solution.
>
>
>
>
> --
> Youâ??re not from the Castle, youâ??re not from the village, you are nothing.
> Unfortunately, though, you are something, a stranger.
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20160817/9957cd79/attachment.sig>