Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:Freenet (Score 1) 134

Quite. However, if security is what you're after, you may not want to use the most POPULAR one, but rather the better one. Like I said, downloaders, who perhaps care more about easy access (popularity) than anonymity, are a different matter.

Comment Re:Freenet (Score 1) 134

Leaked documents do not need a low-latency anonymous channel (Tor) to be leaked. Potential leakers should use something like Mixminion (http://mixminion.net/) for high-latency, highly anonymous submissions. Downloads, however, are a bit more tricky, since they DO need to be low-latency.

Comment Re:Why block? Monitor... (Score 5, Interesting) 74

This is shameless self-promotion, but my colleagues and I have a paper at this year's ACM CCS that addresses just this problem. It's called "Membership-concealing overlay networks," and discusses a network with the explicit security goal of hiding the participants. Since we consider IP addresses to be sufficient to break this concealment, this makes the system also difficult to block at the IP layer. You can find the paper here here, and I would love to get some feedback.

Slashdot Top Deals

"When people are least sure, they are often most dogmatic." -- John Kenneth Galbraith

Working...