-
Notifications
You must be signed in to change notification settings - Fork 12
Open
Milestone
Description
I don't immediately follow how analytics attackers are measuring time to link IP address to first hop, but @TheBlueMatt suggested that they are using this currently, and that a valid countermeasure is to use mixnets with random delays in the routing portion of P2P clients' network protocol.
The discussion starts a little bit earlier than this timestamp in this presentation: https://youtu.be/8BLWUUPfh2Q?t=30m32s
If I could guess, I think he's saying:
- If you encrypt transaction relay traffic between P2P nodes (which people generally aren't so far), network attackers can still observe the time that messages are relayed and use this to infer which encrypted message corresponded to the first hop of a given message. (Also, unless encrypted messages are padded to a standardized size, the size of the message most likely can also be used.)
- Under that condition, you can introduce random delays to attenuate the usefulness of such time-based analysis.
It would be helpful if @TheBlueMatt could weigh in to clarify.
Reactions are currently unavailable