5/2/2023 0 Comments Tor browser slow![]() "These papers are often very important: Tor started out as an academic process, and it is the analysis in peer review that partially contributed to the system's soundness and strength," he told me in an email. Nicholas Weaver, a computer scientist at Berkeley who is an expert in internet security and Bitcoin, told me that this is a start, but it's not time to get our hopes up for a faster anonymous browsing experience. Sometimes these academic papers grow into something, sometimes they don't. ![]() ![]() It's important to remember that Tor itself once started as a lowly proof of concept, way back in 2004. The Tor project told Motherboard that the Carnegie Mellon paper has not yet been published in a peer-reviewed journal (the proposal was published on arXiv, which is a pre-release academic server), and thus has no comment on it yet. Hackers, general users, and security researchers often find flaws that even peer-review doesn't catch. And that's one of the problems with hyping academic papers like the one published by this team: No amount of internal testing compares to what happens when even a handful of real people get their hands on it. HORNET is a proof of concept, and while it appears to work in a laboratory, it's anyone's guess if it'll work out in the real world. In fact, the researchers designed HORNET specifically to be able to block persistent mass surveillance similar to the type the FBI and NSA have used in an attempt to "pave the path for internet-scale anonymity." Instead of using the dark web to, say, buy drugs or send encrypted communication, you might be able to use it to watch videos and do whatever else it is you do on the normal internet. The idea of a totally anonymized web is enticing. "No amount of internal testing compares to what happens when even a handful of real people get their hands on it" The team says the protocol can "scale as required," making it at an option to host "future internet architectures." "HORNET is designed to be highly efficient: Instead of keeping state at each relay, connection state (including, e.g., onion layer decryption keys) is carried within packet headers, allowing intermediate nodes to quickly forward traffic for large numbers of clients," the researchers wrote. Instead, decryption keys and other important information are kept in the headers of packets of information-the team says this makes everything faster. But, unlike Tor, HORNET does not keep the "state" of the connection at each relay. Like Tor, HORNET uses a system of nodes (or relays) to anonymously route traffic around the internet, hiding your true location and true IP address (this is called "onion routing").
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |