Attacks and Solutions

Questions about organisation, special technical questions, troll plain
Post Reply
sushi
Posts: 1
Joined: Thu Mar 30, 2017 1:51

Attacks and Solutions

Post by sushi » Thu Mar 30, 2017 2:08

I read the article "Web MIXes: A system for anonymous and
unobservable Internet access": https://www.freehaven.net/anonbib/cache ... et2000.pdf

This article was published in 2000/2001 and I'm wondering if the part 3 about Attacks and Solutions is applied?

Do the JAP client and the cache proxy send a dummy message? Does Jondonym use a "cut and slice algorithm"? Does the ticket-based authentication system used? What about protection against DoS-Attack?

In the documentation, I didn't see anything about this.

User avatar
Ochnö
Posts: 1710
Joined: Sat Nov 06, 2010 16:03

Re: Attacks and Solutions

Post by Ochnö » Sat Apr 01, 2017 2:15

What documentation?

Look for yourself ;)

https://anonymous-proxy-servers.net/wik ... nd_Sources

Btw. for what reason you think _you_ need a protection against DDOS?
Besides _nobody_ can protect you against DDOS
https://www.firemon.com/latest-ddos-att ... overnance/
There are way to many security holes in IoT so it's easy to bundel millions of clients :(
Don't you Remember,
The Fifth of November,
'Twas Gunpowder Treason Day,
I let off my gun,
And made'em all run.
And Stole all their Bonfire away.

Post Reply