High-speed anonymising network proposed

Discussion in 'privacy technology' started by lotuseclat79, Jul 23, 2015.

  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    High-speed anonymising network proposed.

    Research paper PDF download: arxiv.org/pdf/1507.05724v1.pdf

    (466.2 KB).

    -- Tom
     
    Last edited by a moderator: Jul 23, 2015
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    http://arstechnica.com/information-...s-claim-theyve-developed-a-better-faster-tor/
     
  4. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    It sounds amazing. But I haven't read the paper yet.

    If it is truly amazing, I wonder what chance it has, and how many years it might take.

    For better or worse, Tor has a fairly solid lock on the anonymity userbase. Except for the haters, of course :eek:
     
  5. Forgive me. But how is this different to TOR?
     
  6. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    They're both anonymity networks. But Tor works at application layer, whereas I gather that Hornet would work at network layer. Connections in Tor are roughly analogous to HTTPS in web browsing, plus SOCKS5 proxy capability. I gather that connections in Hornet would be roughly analogous to UDP-based VPN connections.
     
  7. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    It's network layer onion routing. But that means that it can operate stateless, that is to say, it doesn't need to maintain node-node TCP connections (which limit scalability for example). Tor is effectively an overlay on the IP internet.

    The other factor being that the latency is reduced.

    My personal feeling is that low-latency anonymity is very hard to do, and in particular, the paper excludes highly resourced adversaries who can do traffic correlation across the network. The only defense against that is a highly used network, with traffic padding.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.