[tor-talk] A possible solution to traffic correlation attacks,
Not Friendly
notfriendly at riseup.net
Sun Jun 5 14:40:52 UTC 2016
After about an hour of brain storming I may of found a way to stop traffic correlation attacks. The idea is to add an artificial delay of a few randomized ms (two separate delays, one to the tor exit and another deal on traffic exiting the network) and add an extra chunk of randomized data (just a small random amount of KB that never exits the network). It would make traffic harder to correlate. What are your thoughts on this?
More information about the tor-talk
mailing list