top | item 43375826

(no title)

rosa56 | 11 months ago

Tor does not do any mixing and so any attacker who observes the user and the final destination can simply correlate the two by looking at timing. Nym disable this by adding mixing (no one can correlate outputs and inputs because timing is not the same anymore). Also unlike what Tor ( where routing is circuit based which means all traffic goes through the same circuit for the same session), mixnet is packet based (every packet goes through a different path) which makes it veeeery hard for an attacker to correlate input traffic to output because now every messages goes through a different path.

discuss

order

No comments yet.