https://github.com/kwonalbert/riffle

Bastiani Fortress:
> Are there still no implementations yet?
> 
> 12:09 PM, August 2, 2016, Georgi Guninski <gunin...@guninski.com>:
> 
>     On Tue, Jul 12, 2016 at 11:43:48AM +0300, Georgi Guninski wrote:
> 
>           On Mon, Jul 11, 2016 at 07:33:40PM -0400, grarpamp wrote:
>           > http://news.mit.edu/2016/stay-anonymous-online-0711
> 
>           Interesting. So far read only this (it is for dummies).
> 
>           Is riffle resistant to active timing attacks (possibly from internal
>           nodes)?
> 
>           Can sufficiently many malicious nodes cause total DOS? (I suspect 
> they
>           will decrease performance at least).
> 
> 
>     Two days ago I spammed the authors of the Riffle paper with this, no
>     reply so far.
> 
>     My guess is it is vulnerable to active timing attacks, they are so
>     generic. Not sure at all jitter is solution.
> 
> 
> 
> 
> -- 
> You’re not from the Castle, you’re not from the village, you are nothing. 
> Unfortunately, though, you are something, a stranger.
> 

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to