On Wed, Oct 14, 2020, 6:59 PM Karl <gmk...@gmail.com> wrote:

>
>
> On Wed, Oct 14, 2020, 6:34 PM Peter Fairbrother <pe...@tsto.co.uk> wrote:
>
>> On 14/10/2020 18:22, jim bell wrote:
>>
>> > Last year, I tried to start a discussion to implement a new anonymity
>> router network, perhaps using the Raspberry Pi computers.   I got a quote
>> for 500 Raspberry Pi's, at $70 each.  I included a few ideas, some old,
>> some new:
>> >
>> > 1.    Routers could be anywhere, but would include homes and small
>> businesses.  Anyone who has an Internet service with an adequately-large
>> data cap. (Recently, I saw that CenturyLink had removed the data cap from
>> some of its internet services. especially fiber.
>> https://www.highspeedinternet.com/resources/which-internet-service-providers-have-data-caps#:~:text=CenturyLink%20has%20a%201%20TB,you'll%20enjoy%20unlimited%20data
>> .
>> >
>> >   And their data caps, where they still exist, are 1 terabyte/month,
>> which I think would be plenty for an anonymity network.
>>
>> The problem is that a reliable cheap anonymising network for low-latency
>> traffic like web traffic is basically impossible.
>>
>> Tor is about as good as we can get. When I was designing m-o-o-t I
>> didn't include any web anonymiser for that reason.
>>
>> The problem is traffic volume and latency. If we want low-latency web
>> traffic - nowadays [1] that's less than 4 seconds - we can't include
>> fixed file sizes with realistic constraints on traffic.
>>
>> To put some BOTE numbers on that, suppose you want to provide for 1
>> million concurrent users. You have about 150 TB per month user traffic
>> to play with (500 x 1TB, ~3 hops), 150 MB per month per user, or 450 Baud.
>>
>
> Could you explain your math here?  How did 500TB/3 (am I wrong?) become
> 150MB?
>

Well, I see what I did wrong there now, but Peter, 1TB per user is only a 3
Mbps connection (right?). Shouldn't the bandwidth just divide by the number
of hops?


>
>
>> Ouch.
>>
>> > 2.    Extensive chaff.   (which, of course, is an old idea, strangely
>> it's not yet implemented in TOR)
>>
>> Like fixed file sizes - essential for anonymity - chaff and covertraffic
>> takes too much traffic, see above.
>>
>
> I don't see how what you said above is related to whether the data is real
> or decoy.  Obviously you would keep the sum of the two constant.
>
>
>> > 3.    "Output nodes" would output only in encrypted form, so that
>> people generally could not get in trouble for acting as an output node:
>> Their output could be monitored, but not understood as to its content,
>> since it would look like random data.
>>
>> That doesn't work - the users want to connect to any web server
>> somewhere. You could enforce eg TLS but even that does not hide file
>> sizes..
>>
>
> Enforcing TLS is much more reasonable nowadays.  (You could add a plugin
> to use http tricks to hide file sizes.). Not what I would focus on once it
> gets nonsimple.
>
>
>> > 4.    I also thought of an idea that such a network should implement
>> multiple algorithms for networking, simultaneously, limited only by
>> people's imaginations:   People  frequently talk about new ideas for
>> anonymity networks, but how might they try them out in practice?   If an
>> anonymity network is fated to have ONLY ONE routing method, then all new
>> such methods cannot be easily developed:  You'd have to physically build a
>> new network, along with all such associated costs, for each new routing
>> method.  That's completely illogical.
>> >
>> >     Should there be any limit to the number of kinds of routing done?
>> It's all software.   One advantage of this feature is that all these
>> different routing algorithms are mixed together, such it should be harder to
>>
>> That's OK if you are doing development, but not for production - unless
>> the users decide the routing, as in eg Mixmaster. But you can't (or
>> shouldn't) use an anonymiser if you don't know whether it is going to
>> work!
>>
>
> Seems reasonable to make this pluggable.  Final use would need all users
> to look the same, and no exits have a predictable source.
>
>
>> > TOR is doubted for many good reasons, but if it is generally agreed
>> that some form of anonymizing network is needed, then people should be
>> willing to work to provide an alternative.
>>
>
> Seems to me the smaller it is to build the more likely it is to reach
> completion and use.
>
>
>>
>> I was at some of the early meetings when Roger Dingledene, Paul
>> Syverson, Lucky Green, Nick Matthewson, Len Sassaman, myself and others
>> were talking about a web anonymiser, which later became Tor.
>>
>> Other people at those meetings included many if not most of the top
>> anonymity researchers, and some of the top cryptographers, in the world
>> at that time. Tor was not conceived as is was by accident or in
>> ignorance [2], many people (including myself) thought it was about the
>> best that could be done.
>>
>>
>> Roger's thought was that TOR would make mass surveillance difficult and
>> it would be worth doing for that reason, even though it wouldn't prevent
>> targeted attacks by major adversaries. At a set of meetings the next
>> year Roger had gotten some funding, iirc from the US Navy, and Nick had
>> started work on coding.
>>
>> I bowed out almost immediately, Len and Lucky bowed out after a while,
>> because we knew it couldn't be done securely on the user level.
>>
>> After that I pretty much lost interest, though I did keep an eye on the
>> project.
>>
>>
>>
>>
>> The problem is that it's a super Zooko's triangle - you simply can't get
>> reliably anonymous, low-latency and cheap anonymous web traffic.
>>
>> You probably can't even get reliably anonymous and low-latency, at any
>> price.
>>
>>
>>
>> Peter Fairbrother
>>
>>
>>
>> [1] Acceptable low latencies vary according to use and user expectations
>> - fifteen years ago people would wait 20 seconds or more for a web page
>> to load, nowadays they lose interest at 4 seconds. Actually maybe less
>> now, that figure is several years old. And for interactive speech or
>> video latencies should be subsecond.
>>
>> [2] or with evil intent, at least from Roger and Nick.
>>
>> I don't think Paul had any evil intent either, but he was USN and is
>> therefore suspect. It's like my friend from GCHQ - we are friends and we
>> were sort-of colleagues until I retired, but it's a bit like having a
>> policeman live next door - even when you have done no wrong you are
>> always aware that he is a policeman.
>>
>
> My gut is that evil intent is pretty rare in a group of like-minded people
> putting work in.  It's more likely people are acting on differing
> information or experiences, or can't escape something difficult.
>
>
>>
>> One curiousity, the .onion part of the TOR infrastructure was largely
>> driven by Paul.
>>
>

Reply via email to