Page 1 of 1

Attacks and Solutions

Posted: Thu Mar 30, 2017 2:08
by sushi
I read the article "Web MIXes: A system for anonymous and
unobservable Internet access": ... et2000.pdf

This article was published in 2000/2001 and I'm wondering if the part 3 about Attacks and Solutions is applied?

Do the JAP client and the cache proxy send a dummy message? Does Jondonym use a "cut and slice algorithm"? Does the ticket-based authentication system used? What about protection against DoS-Attack?

In the documentation, I didn't see anything about this.

Re: Attacks and Solutions

Posted: Sat Apr 01, 2017 2:15
by Ochnö
What documentation?

Look for yourself ;) ... nd_Sources

Btw. for what reason you think _you_ need a protection against DDOS?
Besides _nobody_ can protect you against DDOS ... overnance/
There are way to many security holes in IoT so it's easy to bundel millions of clients :(

Re: Attacks and Solutions

Posted: Wed Feb 19, 2020 13:29
by AlBrown252
I can't open this document