-
Is this project still active? Is it likely that the mechanism will be adopted in the future? Looking forward to it.
Here are some of my considerations for this protocol:
* Deanonymization potentia…
-
I've been in a traffic analysis rabbit hole lately, and also have been pondering latency characteristics of a much faster Tor. As Tor's congestion decreases due to optimizations and utilization drops …
-
In a recent security disclosure [1, 2], we show how targeted deanonymization attacks performed via the CPU cache side channel can circumvent browser-based defenses. The attack framework we show is abl…
-
Protecting against "Recycled Verification # Attack"
=================================
One possible attack:
-----
Malware on your device, OR malicious voter software, wants to modify your vote …
-
-
# Privacy Implications of Replacing the Oxen Privacy Coin in the ONS Registration Process
## Introduction
[ORC 8](https://github.com/oxen-io/oxen-improvement-proposals/issues/36) proposes the re…
-
## Description
Every SecureDrop runs at least two Tor daemons. From the perspective of the IT administrator at a news organization, it might be useful for them to have the ability to ingest statist…
ageis updated
5 years ago
-
### Idea
Alternative to #300, #246, #234. Before anyone asks, no, this is not a joke idea.
Instead of a symmetric key, use the [Double Ratchet](https://whispersystems.org/docs/specifications/do…
-
# Session User Engagement Report
Edit: read https://github.com/oxen-io/oxen-improvement-proposals/issues/60#issuecomment-1921187399 for latest update.
## Introduction
This report provides a d…
-
Consider adding a deployment consideration comment about how to avoid the thundering herd problem.