Delivery-Date: Mon, 06 Jun 2016 04:30:01 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [138.201.14.202])
	(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id AF0111E00CC;
	Mon,  6 Jun 2016 04:29:58 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 94BCEE12A3;
	Mon,  6 Jun 2016 08:29:52 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id AD6CCE128E
 for <tor-talk@lists.torproject.org>; Mon,  6 Jun 2016 08:29:48 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 13S6OHPp_nEA for <tor-talk@lists.torproject.org>;
 Mon,  6 Jun 2016 08:29:48 +0000 (UTC)
Received: from smtpout.darkdna.net (smtpout.darkdna.net [69.164.196.21])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 7388DE1263
 for <tor-talk@lists.torproject.org>; Mon,  6 Jun 2016 08:29:48 +0000 (UTC)
Received: from regina.darkdna.net (regina.darkdna.net
 [IPv6:2001:19f0:4009:412b:25b1:11c:b7e:d204])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by smtpout.darkdna.net (Postfix) with ESMTPS id 3rNRjD6WZQz19Zp
 for <tor-talk@lists.torproject.org>; Mon,  6 Jun 2016 07:51:28 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=darkdna.net; s=ddna;
 t=1465199488; bh=tGeHX+DAuWTSet1uZUxDeJutf/t9x9n9UR5qIuhw29o=;
 h=Date:From:Subject:To:In-Reply-To:References;
 b=HANnlPNgFc7Fnq4hkpN6HHIOlVTprh/orMPARW+Ribf9mAmNCVtvLWMmHYCY7zSmm
 nJl+TRbcEOf+5YS+R33S3H5+CEAPBHMpXtpuB5BsaLv9B78joCZbrNbHf7SpjF90nU
 sfhCh56uSARSyHBKx+FllcKXvHYqxsfhV7H6rA+8=
Received: from darkdna.net (unknown [172.16.3.99])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by regina.darkdna.net (Postfix) with ESMTPSA id 3rNRjD1gw1z3wg2
 for <tor-talk@lists.torproject.org>; Mon,  6 Jun 2016 07:51:28 +0000 ()
Mime-Version: 1.0
Date: Mon, 06 Jun 2016 07:51:11 +0000
Message-ID: <7f3b50952d4ab7fd5474cac81a6597c5@darkdna.net>
X-Mailer: RainLoop/1.10.0.107
From: coyo@darkdna.net
To: tor-talk@lists.torproject.org
In-Reply-To: <378982e51d09a5802323aa370d66f44c@cannon-ciota.info>
References: <378982e51d09a5802323aa370d66f44c@cannon-ciota.info>
 <8554176B-F17B-4FC6-AFBA-29DA392E4B28@riseup.net>
 <CAD2Ti29UX8dZxz_McuC8GAaigWXgeAbWZR=QZBDfhLLP7Y_RtQ@mail.gmail.com>
 <6439b26156f03f3f6a51e170b5b9fbe3@riseup.net>
 <CAB7TAMn9hWwZ0qHstbPqPwC6q=38EtNYWu0DO8Be_s27r-_g8w@mail.gmail.com>
 <0c8e91f11fc4c748d4024dcc09490c46@riseup.net>
Subject: Re: [tor-talk] A possible solution to traffic correlation attacks,
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

June 6 2016 12:55 AM, "CANNON NATHANIEL CIOTA" <cannon@cannon-ciota.info> wrote:
> Another idea, if micro delays would not work out for low latency anonymizing
> networks such as Tor would be to perhaps add padding, randomized padding between each node. If
> micro-delays and/or padding is bad idea, then other solutions should be discussed.

IIRC, I2P does this to some degree now. They had Garlic routing from the beginning, but they've introduced padding, dummy traffic, exploratory tunnels, and random BitTorrent swarm traffic to help haystack potential target traffic.

I could be wrong, though. I'm just a kid with an interest in this stuff. I'm no engineer.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

