/g/ - Technology

install openbsd

[Make a Post]
[X]





Katzenpost (Mix network) - Traffic analysis resistant messaging Nanonymous No.1803 [D][U][F][S][L][A][C]
File: efa874dd5de1266e192e228f5d09b9c89d91640f80e3b395fbbbf69a44165168.jpg (dl) (182.92 KiB)

>Goals
> to prevent a sufficiently global passive adversary from learning who is communicating with whom
> to detect active attacks against the network infrastructure
> hide message content from participating providers, hide recipient identity from the sender’s provider, and the sender identity from the recipient’s provider
> reliable out of order delivery
> support for various “message based” use cases like ‘instant messaging’, ‘e-mail’, and ‘crypto currency’ anonymization

https://katzenpost.mixnetworks.org/
https://github.com/katzenpost
https://github.com/katzenpost/docs

Has anyone tried a mix network before and this one in particular? I think this should be looked into much more than it currently is, because low-latency networks such as Tor or I2P are not protecting you from people who can see incoming and outgoing traffic.

Nanonymous No.1804 [D]

>>1015353
Some videos on the Katzenpost (Panoramix) mix network

>BornHack 2018 - David Stainton - Modern Mix Network Design.mp4
https://www.infocon.org/cons/Bornhack/Bornhack%202018/BornHack%202018%20-%20David%20Stainton%20-%20Modern%20Mix%20Network%20Design.mp4

> Practical Mix Network Design - Strong metadata protection for asynchronous messaging
>David Stainton and jeffburdges
https://media.ccc.de/v/34c3-8974-practical_mix_network_design