https://github.com/kwonalbert/riffle
Bastiani Fortress: > Are there still no implementations yet? > > 12:09 PM, August 2, 2016, Georgi Guninski <gunin...@guninski.com>: > > On Tue, Jul 12, 2016 at 11:43:48AM +0300, Georgi Guninski wrote: > > On Mon, Jul 11, 2016 at 07:33:40PM -0400, grarpamp wrote: > > http://news.mit.edu/2016/stay-anonymous-online-0711 > > Interesting. So far read only this (it is for dummies). > > Is riffle resistant to active timing attacks (possibly from internal > nodes)? > > Can sufficiently many malicious nodes cause total DOS? (I suspect > they > will decrease performance at least). > > > Two days ago I spammed the authors of the Riffle paper with this, no > reply so far. > > My guess is it is vulnerable to active timing attacks, they are so > generic. Not sure at all jitter is solution. > > > > > -- > You’re not from the Castle, you’re not from the village, you are nothing. > Unfortunately, though, you are something, a stranger. >
signature.asc
Description: OpenPGP digital signature