I read the article "Web MIXes: A system for anonymous and
unobservable Internet access": https://www.freehaven.net/anonbib/cache ... et2000.pdf
This article was published in 2000/2001 and I'm wondering if the part 3 about Attacks and Solutions is applied?
Do the JAP client and the cache proxy send a dummy message? Does Jondonym use a "cut and slice algorithm"? Does the ticket-based authentication system used? What about protection against DoS-Attack?
In the documentation, I didn't see anything about this.
Attacks and Solutions
Re: Attacks and Solutions
What documentation?
Look for yourself
https://anonymous-proxy-servers.net/wik ... nd_Sources
Btw. for what reason you think _you_ need a protection against DDOS?
Besides _nobody_ can protect you against DDOS
https://www.firemon.com/latest-ddos-att ... overnance/
There are way to many security holes in IoT so it's easy to bundel millions of clients
Look for yourself

https://anonymous-proxy-servers.net/wik ... nd_Sources
Btw. for what reason you think _you_ need a protection against DDOS?
Besides _nobody_ can protect you against DDOS
https://www.firemon.com/latest-ddos-att ... overnance/
There are way to many security holes in IoT so it's easy to bundel millions of clients

-
- Posts: 10
- Joined: Tue Feb 18, 2020 11:31
Re: Attacks and Solutions
I can't open this document
Re: Attacks and Solutions
Attacks on information storage and systems are not uncommon, as well as protection from them. There are many methods for adding security layers and enhancing them. Almost everywhere I use 2fa, dual authentication for adfs server allows you to configure access using SSO technology. This method of protection makes it easier to secure the system in a reliable way.