[liberationtech] New protocol sacrifices bandwidth for metadata privacy
Aymeric Vitte
vitteaymeric at gmail.com
Tue Aug 12 15:38:18 PDT 2014
Le 12/08/2014 22:12, Marc W. Abel a écrit :
> On 08/12/2014 05:19 AM, Aymeric Vitte wrote:
>> I don't know what is the state of the art regarding this but is there
>> not a way while parsing the slots to determine that this one might have
>> your key so you don't have to decrypt everything and just decrypt the
>> slots that might have it? (I have a similar issue with Peersm to check
>> the pieces)
>
>
> Hi Aymeric,
>
> By design, the answer is no. I'd either be leaking key material
> (directly or indirectly), or leaking metadata.
Not sure, the problematic is: you have some keys, you receive some
encrypted packets, you MIGHT detect a pattern inside them that MIGHT
indicate you that the packet knows one of your keys, the attacker can
not do the same without knowing your keys, how to do this without
spectacular computation, I don't know, that's why I am raising this here.
Maybe this does not exist at all, would be surprising...
Regards,
--
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms
More information about the liberationtech
mailing list