[tor-talk] The Aqua design (was: A possible solution to traffic correlation attacks)
Philipp Winter
phw at nymity.ch
Tue Jun 7 21:02:43 UTC 2016
On Sun, Jun 05, 2016 at 02:34:22PM -0400, grarpamp wrote:
> You need fulltime regulated fill traffic, within which, your traffic resides.
The Aqua design goes in that direction. It is a traffic
analysis-resistant anonymity system for BitTorrent:
<https://research.microsoft.com/pubs/199302/sigcomm13-aqua.pdf>
It handles traffic at the network edges differently than the core, to
achieve low-latency resistance to traffic analysis. At the edges, it
dynamically groups clients with similar usage patterns together to
provide k-anonymity. The network core consists of nodes that exchange
constant-rate traffic that is padded when necessary.
However, Aqua cannot protect against long-term intersection attacks and
the authors haven't really thought about incentives for joining the
network; I could see the network only being used for illegal file
sharing, making it an attractive target for blocking with low collateral
damage.
More information about the tor-talk
mailing list