3/10/2023 0 Comments Mit riffleHe spent 26 years in various policing roles, including 15 years as a deputy medical examiner, the leader of a multi-agency crash investigation team, and the chief of police. Rich Riffle moved to Idaho from Oregon five years ago after retiring from a career in law enforcement. Keep an eye on Kwon’s site for further updates.To help voters make an informed choice, BoiseDev interviewed Owens and Riffle to find out more about their backgrounds, beliefs, and qualifications. “There are indeed some incompatible design goals,” Kwon wrote, “However, they could also be complementary to each other, taking advantage of both the security of Riffle and the large anonymity set size of Tor.” There’s no plan to commercialize it, either, nor will it be a replacement for Tor, even though it does some things vastly better. There’s no downloadable version of Riffle right now - Kwon said he’d like to clean up the code a bit first, since it’s really just a prototype at present. Small, secure networks rather than ubiquitous global ones is the idea, then, although 100,000 anonymous nodes is more than enough to serve many a country or community. “However, in terms of performance, since all messages go through all servers, the less servers there are, the more performant it is.” “The more servers there are, the more secure it is,” wrote Kwon. But adding servers, counterintuitively, would actually degrade performance in a way. That was done, Kwon wrote, on three servers running on a gigabit LAN. File sharing with hundreds of users could theoretically reach 100 KB/s, according to the researchers’ estimates, and less bandwidth-intensive use like microblogging could handle 100,000 users with under 10 seconds of latency. With this change, the resulting network is not only resistant to both active and passive attacks, but scales well and doesn’t use too much processing time. You can read about the technical details in the paper itself (PDF) but the gist is that it uses a mix of public-key and symmetric cryptography, not dissimilar to how it works on the web. The key advance made by Kwon and his team is was implementing both in such a way that those weaknesses are avoided. DCNs didn’t scale well, requiring a lot of bandwidth, and the proofs needed for mixnets were too computationally expensive to keep latency low. This way, any server tampering with messages will be spotted at once.īoth these techniques - mixnets and dining-cryptographer networks, respectively - have existed independently for years, but serious drawbacks prevented either of them from being adopted, let alone both in the same system. Messages are sent from the user to all servers, not just one - and outgoing messages must be signed with an independently verifiable mathematical proof that they are the ones the server received. Then comes a two-part measure to prevent a malicious server from simply replacing real messages with dummies and tracking a single target one. In addition to wrapping messages in multiple layers of encryption (the eponymous technique of Tor, “The Onion Router”), Riffle adds two extra measures meant to baffle would-be attackers.įirst, servers switch up the order in which received messages are passed on to the next node, preventing anyone scrutinizing incoming and outgoing traffic from tracking packets using metadata. “Riffle aims to provide as much traffic analysis resistance as possible.” “Tor aims to provide the lowest latency possible, which opens it up to certain attacks,” wrote Kwon in an email to TechCrunch. They might not be able to tell exactly what is being sent, but they can put together a breadcrumb trail tying a user to traffic coming out of an exit node - at least, that’s the theory.Ī team of researchers led by MIT grad student Albert Kwon (with help from EPFL) aims to leapfrog Tor’s anonymizing technique with a brand new platform called Riffle. The potential problem with Tor is that if an adversary gets enough nodes on the network, they can work together to track the progress of packets. A new anonymizing protocol from MIT may prove more resilient against such determined and deep-pocketed attackers. Tor has been the go-to for anonymous communication online for years now - and that has made it one of the juiciest targets possible to the likes of the NSA and FBI.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |