Collaboration

Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes

Download Now Free registration required

Executive Summary

Anonymous communication schemes allow their users to communicate with others while concealing who communicates with whom. Deployed anonymity schemes tend to be either high-latency - they provide strong anonymity, but are unsuitably slow for casual Internet browsing - or low-latency, aiming for anonymity against weaker adversaries, but better-suited for casual Internet browsing. The majority of these schemes forward end-user traffic though redirecting relays, using multi-layered encryption between the source and every intermediate relay to ensure both end-to-end privacy and message size unity.

  • Format: PDF
  • Size: 1054.1 KB