[tor-dev] Using the HS protocol for unlinkability only

Michael Rogers michael at briarproject.org
Wed Mar 26 16:54:28 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi all,

(Please let me know if this belongs on tor-talk instead of here.)

I'm working on a messaging app that uses Tor hidden services to
provide unlinkability (from the point of view of a network observer)
between users and their contacts. Users know who their contacts are,
so we don't need mutual anonymity, just unlinkability.

I wonder whether we need everything that the Tor hidden service
protocol provides, or whether we might be able to save some bandwidth
(for clients and the Tor network) and improve performance by using
parts of the hidden service protocol in a different way.

First of all, we may not need to publish hidden service descriptors in
the HS directory, because we have a way for clients to exchange static
information such as HS public keys out-of-band.

Second, we may not need to use introduction points to protect services
from DoS attacks - we can assume that users trust their contacts not
to DoS them.

Third, we may be able to reduce the number of hops in the
client-service circuits, because we don't need mutual anonymity.

This isn't the first app to use hidden services for unlinkability, so
I expect this topic's come up before. Are there any discussions I
should look at before coming up with hare-brained schemes to misuse
the hidden service protocol?

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBCAAGBQJTMwZDAAoJEBEET9GfxSfM330H/2seo/oZgz2K54W5oxkRKa07
Jh+W4swi2utFs728bEdbWDl6EaWiTYvwlUxTBllrXVTGQolPxUsHo4jHLk0Xt5ah
Jo3RZxbiKF6rZkcRC66nxF6aGAQ0JZn+xkvVB4xb/2vzMg7jQ9N+GACQ7fRKEvqA
GgqqEjKVJdzgtBKQBl0eZYZi/4VXisCEtN7pY1MHiO5k/wFMsg3z1MceN9HSw7EG
JedzCLT0r/OVW/f07/1iQU6TWRohcOuE/pBCHi+6ctgp/6a+NehKBw4gIcm1aBur
kZiSxea0FIpWdarTcMVctwayLhhzpTuMB6/0YOBO+1/u2rqkLl6njqnDaALkicQ=
=AnYI
-----END PGP SIGNATURE-----


More information about the tor-dev mailing list