Skip to content

Countermeasure against linking IP to address based on first hop analysis: random delays #136

@kristovatlas

Description

@kristovatlas

I don't immediately follow how analytics attackers are measuring time to link IP address to first hop, but @TheBlueMatt suggested that they are using this currently, and that a valid countermeasure is to use mixnets with random delays in the routing portion of P2P clients' network protocol.

The discussion starts a little bit earlier than this timestamp in this presentation: https://youtu.be/8BLWUUPfh2Q?t=30m32s

If I could guess, I think he's saying:

  1. If you encrypt transaction relay traffic between P2P nodes (which people generally aren't so far), network attackers can still observe the time that messages are relayed and use this to infer which encrypted message corresponded to the first hop of a given message. (Also, unless encrypted messages are padded to a standardized size, the size of the message most likely can also be used.)
  2. Under that condition, you can introduce random delays to attenuate the usefulness of such time-based analysis.

It would be helpful if @TheBlueMatt could weigh in to clarify.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions