The #mixnet use is unclear and the lack of #Loopix-style loop messages seems like a potential problem for cover traffic.
Cover traffic is entirely unmentioned during the entirety of the slides.
It would be possible to build that atop of #Veilid of course.
There are no mentions of delays in messages nor any other manipulation to mitigate timing analysis.
If nodes select routes based on performance, that's an additional deanonymization risk (shared by #I2P).
@jeffcliff @brewsterkahle That is an interesting option, though I'm not sure #Tor is preferable to #I2P for torrenting or other #bittorrent-adjacent protocols (even if it lacks padding, loop messages, delays, batching, etc) .
Although they're not using the default Tor network, their implementation doesn't seem like it'd quite reach the effectiveness of an actual #mixnet.
That could of course be added to their protocol in time.
@SecurityWriter @film_girl I think we should've been regarding that as extremely likely anyway and investing in #AnonymousNetworks a whole lot more, such that finding the host of any given service or instance is somewhere between impractical and just not happening.
Along with such precautions, maximizing the ability ability for our software to operate across and between multiple networks.
For some like the UK (https://phpc.social/@derickr/110398550380365221) using phone-based relays might be needed.
#anonymousnetworks #darknet #mixnet
@HistoPol It is free, and no not at all.
#I2P is a conventional #mixnet / #darknet. More specifically, it is a #P2P (peer to peer) mixnet.
It is not just some fancy proxy network for browsing the #clearnet and cannot generally be used to browse the clearnet.
While there are exit gateways for I2P, that's not the primary use nor purpose of the network.
I2P is used mostly for communicating anonymously with other participants of the I2P network.
#i2p #mixnet #darknet #clearnet #p2p
@HistoPol @Viss #Mixnets like #I2P have a more promising design as far as resistance to such traffic analysis goes. I2P however is not perfect and the small size of the network plays against it, as it makes bruteforce enumeration of its participants an option (if one somewhat expensive).
In general mixnets are the safest design for low-to-high latency networks with surveillance resistance.
The #Loopix whitepaper can make for some interesting reading on that topic.
@HistoPol @Viss That would be the conventional bare internet (Layer 3 & 4 or Transport, depending on the model you prefer), which lacks any measure for maintaining anonymity and barely provides anything for connection privacy (IPSec sucks, but technically exists).
Some of it is a necessary base for sustaining the use & existence of a safer network on top of it, but using it by itself without any further precautions is simply unsafe.
@SocialistStan @lauren @Shachihoko @HistoPol @eff @team Even if they try to ban instances from doing that, #ActivityPub relays work and there's no reason instances can't be moved to #Tor, #I2P or other #AnonymizationNetworks & #mixnets
You could also add full #AsynchronousCommunication support to relays including #sneakernet
#tor #i2p #anonymizationnetworks #asynchronouscommunication #sneakernet #activitypub #activitypubrelay #mixnets #mixnet
@nytpu It's worth noting that a better option yet than the private sites is to use #P2P #AnonymizationNetworks and #darknets, particularly #mixnet implementations.
They tend to be gratis, #FreeSoftware and better at complicating traffic & timing analysis.
#darknet #anonymousnetwork #anonymity #p2p #anonymizationnetworks #darknets #mixnet #freesoftware
@Lockdownyourlife Non #mixnet proxy-based solutions like #Tor are particularly weak to flow & timing analysis.
If Tor as a multi-hop option is vulnerable (https://support.torproject.org/about/attacks-on-onion-routing/), why would a single-hop with a significant commercial presence be any better?
In other words, why spend money when you can have slightly better for free?
@ProfCyberNaught @techandcoffee @Stark9837 @geospart Indeed, but this is why I'm recommending multi-hop protocols like #Tor & #mixnet implementations like #I2P over single-hop proxies, as they make it much harder to find the source IP.
I2P in particular not only means end-to-end encryption to any endpoint, but also that finding the origin & destination of any transmission is non-trivial as you'd need to prove a given node is even the origin at all (because all nodes participate in the mixnet).
Pro-tip for admins: Enable users to access your resources through #anonymization networks.
The wider the use of #Anonymity tools, the more effective they get. Some use them for normal #privacy, others to stay alive.
Among the lowest friction for adoption are #Tor and #I2P. A #proxy network and a #mixnet, respectively. These are low-latency networks compatible with conventional TCP/IP protocols.
Allow the use of #API clients, so that fingerprinting of users is harder.
#anonymization #anonymity #privacy #tor #i2p #proxy #mixnet #api
@dalias @blakereid Yep.
All those who can should be hosting nodes for #anonymization networks. The network is stronger and safer the larger it is.
This goes for #I2P and for #Tor.
Sites also should actively support use of those networks, without #Javascript which can be used for deanonymization and thus has no place on them.
Sadly that's still not as good as proper #AsynchronousCommunication like #Usenet or #NNCP nodes for resilience, but it's a start.
#anonymization #i2p #tor #javascript #asynchronouscommunication #usenet #NNCP #anonymity #privacy #mixnet
@dekkzz76 @screwtape Oh no not at all, #I2P is a closed network (#darknet) & internal #mixnet.
You need special gateways for routing traffic onto the #clearnet and the majority don't use that because that defeats the whole point of the network.
#I2P doesn't purport to be a glorified proxy like #Tor.
So any server you host will be fully internal to #I2P and opaque to your ISP. All they see is traffic to a certain set of randomly-chosen ports by the I2P router (or set by yourself).
#i2p #clearnet #tor #darknet #mixnet
@rtp_tech_tips So generally, host more #I2P routers to improve resilience.
Sounds good to me, I2P evangelism is good. We need more #mixnet goodness in this world.
#i2p #mixnet #anonymity #darknet #privacy
@qurlyjoe It's kind of orthogonal to the earlier conversation, but shortly put, #i2p is an anonymization #mixnet and #eepsites are simply sites primarily or exclusively intended to be reachable from it.
It's possible through some clever cryptography to make an endpoint solely reachable by a given set of keys, among other options, so that not even all #i2p users can reach the endpoint.
One could host #fediverse servers on it. Some do, but bridging to the normal #clearnet is complicated.
#i2p #mixnet #eepsites #fediverse #clearnet
@chadloder @Raven47 The publicly routable #internet without any anonymization overlays like #Tor or #I2P.
It is a lot more difficult to start frivolous lawsuits against admins & servers that are pseudonymous and only reachable over overlay networks that make finding the server difficult at best and effectively guarantees cross-jurisdictional cooperation is a requirement to even start considering how to find them (nevermind actually succeeding).
#internet #tor #i2p #darknet #mixnet #clearnet
The Nym #Mixnet - full-privacy for users or on how to get protection from #government #surveillance and surveillance #capitalism.
... https://fosdem.org/2023/schedule/event/nym_mixnet/ #FOSDEM
#mixnet #government #surveillance #capitalism #fosdem
RT @nymproject@twitter.com
We think it's pretty cool that @cg1_bin@twitter.com from @notrustverif@twitter.com has been testing the validation of #Bitcoin transactions anonymously with the help of the Nym #mixnet! 😎
What are the other ways you are using the Nym mixnet to #privacy-enhance your life?
https://twitter.com/cg1_bin/status/1620817982611161088?s=19
🐦🔗: https://twitter.com/nymproject/status/1621072935761870850
#NymTech is a #mixnet that's quite interesting - https://www.youtube.com/watch?v=QBX5AK3DXqw
Further information on the website: https://nymtech.net/blog/