Attacks and Solutions

Questions about organisation, special technical questions, troll plain
Post Reply
Posts: 1
Joined: Thu Mar 30, 2017 1:51

Attacks and Solutions

Post by sushi » Thu Mar 30, 2017 2:08

I read the article "Web MIXes: A system for anonymous and
unobservable Internet access": ... et2000.pdf

This article was published in 2000/2001 and I'm wondering if the part 3 about Attacks and Solutions is applied?

Do the JAP client and the cache proxy send a dummy message? Does Jondonym use a "cut and slice algorithm"? Does the ticket-based authentication system used? What about protection against DoS-Attack?

In the documentation, I didn't see anything about this.

User avatar
Posts: 1738
Joined: Sat Nov 06, 2010 16:03

Re: Attacks and Solutions

Post by Ochnö » Sat Apr 01, 2017 2:15

What documentation?

Look for yourself ;) ... nd_Sources

Btw. for what reason you think _you_ need a protection against DDOS?
Besides _nobody_ can protect you against DDOS ... overnance/
There are way to many security holes in IoT so it's easy to bundel millions of clients :(

Posts: 10
Joined: Tue Feb 18, 2020 11:31

Re: Attacks and Solutions

Post by AlBrown252 » Wed Feb 19, 2020 13:29

I can't open this document

User avatar
Posts: 13
Joined: Fri Aug 07, 2020 12:24

Re: Attacks and Solutions

Post by Chill » Tue Oct 20, 2020 2:05

Attacks on information storage and systems are not uncommon, as well as protection from them. There are many methods for adding security layers and enhancing them. Almost everywhere I use 2fa, dual authentication for adfs server allows you to configure access using SSO technology. This method of protection makes it easier to secure the system in a reliable way.

Posts: 31
Joined: Thu Oct 22, 2020 11:49

Re: Attacks and Solutions

Post by bomjik » Thu Oct 22, 2020 13:06

interesting articles

Post Reply