[tor-talk] A possible solution to traffic correlation attacks,

mrnobody at mail-on.us mrnobody at mail-on.us
Fri Jun 10 06:17:59 UTC 2016


Seems like an interesting idea, but this at the end translates into you
opening a webpage,
and it not loading for minutes. Only adding seconds or milliseconds
wouldn't avoid correlation,
or it wouldn't become much more expensive.

One other idea that comes to my mind would be to cache on the network
some amount of the
requests, or replicate part of the content of say, hidden services in
other nodes. In this way,
requests to hidden services may not reach at all the hidden service
itself, but a replica of it.
This is in a way similar to what Freenet does.


Not Friendly:
> After about an hour of brain storming I may of found a way to stop traffic correlation attacks. The idea is to add an artificial delay of a few randomized ms (two separate delays, one to the tor exit and another deal on traffic exiting the network) and add an extra chunk of randomized data (just a small random amount of KB that never exits the network). It would make traffic harder to correlate. What are your thoughts on this?


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20160610/fbfe6b70/attachment.sig>


More information about the tor-talk mailing list