ROBERT-proximity-tracing / documents

Protocol specification, white paper, high level documents, etc.
Other
247 stars 21 forks source link

Source IP address #30

Open zglozman opened 4 years ago

zglozman commented 4 years ago

What measures can be taken to protect the source IP of the mobile device? (without using TOR). All of this seems a bit disingenuous if the server can associate between the pseudonym and the IP address of the user running the application. Any thoughts on overcoming this challenge? Clearly there will be a NAT on the way, but in many cases, this information can still be resolved as it is done routinely by LE today.

LilithWittmann commented 4 years ago

See also the discussion about IP addresses/Tor in #6