Riffle: an efficient communication system with strong anonymity
Peter Bourgelais
peter.bourgelais at gmail.com
Wed Aug 17 10:47:00 PDT 2016
https://github.com/kwonalbert/riffle
Bastiani Fortress:
> Are there still no implementations yet?
>
> 12:09 PM, August 2, 2016, Georgi Guninski <guninski at guninski.com>:
>
> On Tue, Jul 12, 2016 at 11:43:48AM +0300, Georgi Guninski wrote:
>
> On Mon, Jul 11, 2016 at 07:33:40PM -0400, grarpamp wrote:
> > http://news.mit.edu/2016/stay-anonymous-online-0711
>
> Interesting. So far read only this (it is for dummies).
>
> Is riffle resistant to active timing attacks (possibly from internal
> nodes)?
>
> Can sufficiently many malicious nodes cause total DOS? (I suspect they
> will decrease performance at least).
>
>
> Two days ago I spammed the authors of the Riffle paper with this, no
> reply so far.
>
> My guess is it is vulnerable to active timing attacks, they are so
> generic. Not sure at all jitter is solution.
>
>
>
>
> --
> You’re not from the Castle, you’re not from the village, you are nothing.
> Unfortunately, though, you are something, a stranger.
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cpunks.org/pipermail/testlist/attachments/20160817/9957cd79/attachment.sig>
More information about the Testlist
mailing list