[tor-talk] Network Analysis of Overlay Networks, Capabilities, Fill Traffic [was: VPN less safe?]

Cain Ungothep ungocain at yandex.com
Wed Jan 27 01:08:09 UTC 2016


> It would be harder for that analysis to succeed against networks
> that filled between all the nodes with fill traffic when unused and
> not needed for user traffic. (And in the sense of Tor, between clients
> and some number of guards). But that's hard to design so that it
> is functional. And no one in the overlay network / messaging field
> really seems to be trying it. Mindset, OMG bandwidth, probably
> buzzkills most research before it gets started.

I'll just name-drop these two hopefully-more-correlation-resistant
communication systems, in case people want to discuss them.

1) In relation to the "noisy traffic" you mentioned:

vuvuzela (WIP):
  https://github.com/davidlazar/vuvuzela

2) In relation to mixing networks:

bitmessage (by now fairly well known):
  https://bitmessage.org/
  https://github.com/Bitmessage/PyBitmessage


More information about the tor-talk mailing list