>As crucial as Tor's anonymity network can be for keeping your online activity private, it's not flawless -- a motivated hacker can compromise legions of users, whether they're crooks or privacy-minded innocents. Researchers from MIT and EPFL might have a better way. They've developed an anonymity network, Riffle, that promises to maintain privacy so long as at least one server is safe.
>The secret is the use of a mixnet, where servers switch the order of messages as they're received, but without using relatively inefficient public keys. Instead, Riffle relies on a verifiable shuffle (where you shake up a message's encryption but can verify the changes) across all servers for the initial connection, and authentication encryption (where you prove the validity of the encrypted message itself) for the rest. In essence, even compromised servers can't mess things up -- they have to shuffle messages correctly for the good servers to accept the incoming data.
>And importantly, the technique is extremely efficient, to the point where transferring takes a tenth of the time that it would on a conventional anonymity network. That's particularly important when the nodes on these networks are frequently users' computers.
Take this, and ZeroNet and we've got ourselves a new internet Wild West.
Ethan Jackson
Lets all love lain
Robert Morris
I'm thinking about making lain my waifu, I love smart girls.
Andrew Jones
go to lainchan
Lucas Butler
>how are they gonna block pedos & potheads? it will start to decay the moment pedos & drugdealers are free to roam, just like it happend to tor.
Landon Edwards
>trusting anything said by MIT niggers
Julian Lee
Tor is still very good at anonymizing users. You just have to be careful. Get off Sup Forums Terry.
Asher Edwards
bamp
dis gon b gud
Jeremiah Miller
>administrated by a 18yo >full of le haxx kids
Brayden Adams
lainchan is dead bro
Jack Young
>Sup Forums >used to be administrated by a normalfag >now administrated by an out of touch Japanese businessman
Jayden Rivera
majority of the tor content is illegal crap. there's nothing of value for normal people on it, which is sad
Bentley Gutierrez
>normal people >needing access to this shit Why? So they can fuck that over and make it all casual shite?
Isaiah Price
Moot wasn't always a normalfag ya know.
Kevin Rodriguez
no it's not. >there's nothing of value for normal people on it It's an anonymity network. Not really a place to host content for long periods of time.
Andrew Allen
it's the other way around. it's the casuals that are the pedophiles, so your argument is still correct. >keep the pedos/casuals out of tor
Juan Morales
>He was perfectly normal, like Mark Zuckerberg, Benito Mussolini, Mother Teresa, Michal Jordan, or any other typical person you are likely to meet on the street at 4am on the good side of town.
Isaac Rogers
...
John Cook
Tor is also govt
Carson Lewis
A shame you seemed an honest man.
Jayden Johnson
>wanting to spend time with 16 y.o edgy leftist teens
At this point my name is mr Sceptisaur, I think humanity can forget all about privacy at this moment and erase the word completetly from the dictionary. We are unfortunatly no longer able to get our privacy back.
Kevin Powell
>MIT >made Lisp >secure
James Ross
And all the fears you hold so dear
Nathan Williams
>(((lisp)))
Christopher Young
>censorship mechanisms >on an anonymity network stupid fucking people will be the death of us all
Julian Martinez
what's wrong with lisp?
Ian Brooks
Lisp is JavaScript with more parentheses.
>Javascript was described as "we want to do lisp in the browser" to get its designer interested, if I remember that interview correctly...
>Indeed, Waldemar Horwat once told me that he viewed JavaScript as essentially Common Lisp with a C-like syntax. In fact Waldemar defined a metalanguage, wrote an interprepter for his metalanguage in Common Lisp, and then wrote the JavaScript spec in his metalanguage, thereby enabling him to actually run the specification. It was a clever technique.
>more secure than tor >solution is only for small groups and can't scale like tor Does anyone even read the model and future work sections?
Ayden Garcia
>Does anyone even read the model and future work sections? God no. Reading is hard, shitposting takes no effort whatsoever. Welcome to the new Sup Forums, because even the minuscule standards of the old Sup Forums were too high for these people.
Kevin Turner
DON'T DIE
Gavin Smith
Better than spending time with weeaboo """"rightist"""" insecure neets
Jeremiah Cooper
this. Fucking javascript is whatever thing is the furthest from a lisp that may exist
Jason Walker
What if the government partnered with MIT to make an "anonymous" network that is easy for them to monitor and track?
I bet the nsa will have a bunch of day 1 backdoors or whatever the hell to this system.
Julian Gray
More than likely they did, but as long as you set up the pretense of anonymity and aren't dealing in things threatening national security, they'll leave you alone.
Wouldn't want to risk the word getting out that the system is compromised just to catch a few people watching captain price
Blake Ortiz
Will turn to whisper in your ear
I've been following this project for ages as a proof of concept of a first-hop verifiable mixnet.
The performance is absolutely dire - ~1Mbit/s when used for file transfer im real-world testing - compared to garlic routing or onion routing, but unlike them, it is strong against global passive and active attackers.
It's great to see it published and validated at last!
My own work on hybrid mixnets is a bit ahead of this (if it is proved to work), and currently achieves roughly ~5000ms latency and a comfortable 180Mbit/s file transfer with the current nodes on the test network (upload speed limitations would probably halve bandwidth for a full real-world network although I've tried to simulate this, and this speed does not rely on packet order: an ordered connection is about an order of magnitude slower, but still fairly acceptable). The routing algorithm still needs a lot of work, however: anti-Sybil defenses are a real pain, especially if you want a lower-latency path, you will have to trade some anonymity for latency there, but I think with further work I can make individual streams indistinguishable to a global active attacker with less than 51% of the network, mitigating the attack on low-latency paths by using high-latency non-ordered paths, like bulk file transfers, as cover traffic.
More research needed, etc.
Lucas Campbell
>MIT Night as well call it NSA,and people will fall for this. Jesus the world we are living in.
Juan Ortiz
Is there any actual implementation of this available to play with yet or not?
Brandon Torres
are you working alone?
Asher Bailey
>majority of the tor content is illegal crap. I'm not sure how this is a valid criticism given that is part of its purpose, though not its original purpose
Nathaniel Rogers
>given that is part of its purpose when most people use Tor it's for anonymity. Most people wouldn't consider anonymity illegal but some countries do. So yes, sometimes Tor is used to do "illegal" stuff but the term illegal is subjective based on country and feelings for the user.
I use Tor because I don't like the feeling of being watched.
Joshua Barnes
You're just jealous that whatever shitty school you went to doesn't own an ENTIRE /8 block of IPv4 addresses.
Kevin Morgan
Net 18 represent!
Liam Butler
Does Lain have a tube of thermal paste in her mouth?