‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Tuesday, May 19, 2020 10:41 PM, jim bell <jdb10...@yahoo.com> wrote:

> Algorithm-agnostic anonymization network.
>
> Let's say we are agreed that a new anonymization network should be 
> implemented.  One problem is that advances in such networks generally  
> require implementing entirely new networks to check out new algorithms and 
> new features, such improvements are strongly deterred.  After all, that's one 
> reason that TOR doesn't get as many improvements as we might like.  (Another 
> reason is that it is financed, at least in part, by people who are hostile to 
> a "too-good" anonymization system.)
>
> Sure, we could implement a new set of nodes, hopefully at least 1000 in 
> number. I think that ordinary, residential users should be able to run nodes. 
> Internet services are provided with as much as 1 terabyte/month capacity, and 
> possibly unlimited as well.  (CenturyLink 1 Gbps, for example)    We could 
> implement a new onion-routing system, akin to TOR but with some improvements, 
> most prominently adding chaff.  So far, so good.  But there may be other 
> ideas, other improvements that people might want to try out.
>
> I've already proposed that it should be possible for just about every node to 
> be an output node.  Possibly every node should be an input node, as well.   
> The big impediment to this is that people naturally want to avoid the 
> potential legal harassment they might get if their IP node sent out gigabytes 
> of 'in the clear' forbidden data.  My ideas for a solution?  Output data 
> could be encrypted, enough to make it unreadable except by the end recipient. 
>  The operator of an output node that emits only seemingly-random data would 
> be hard to hold legally responsible for that forbidden content, since nobody 
> expects him to know how to convert it into plaintext.  And/or, the data can 
> be output into two streams, which would be XOR'd with each other only by the 
> intended recipient to find the data.
>
> And, this network could also run different anonymization algorithms, 
> simultaneously.  Onion-routing may have its own limitations.  Somebody might 
> have a good idea for an alternative system.  Why shouldn't it be possible to 
> serve two algorithms?  Or dozens?  How about Bittorrent as well?  Imagine 
> 1000 nodes, each equipped with a 10-terabyte hard drive?
>
>                  Jim Bell

Hi,
I am preparing a draft of a draft for a spec of what I think would be the ideal 
complimentary anonymization overlay that fits on the already running 
distributed system I am working on, which is USPS and is very good.
It would be great if many ideas arise in this list so we can start focusing a 
conversation. My personal interes is to achieve a system that can provide Sybil 
protection for voting systems. Which is the reason Tor cannot be used with 
USPS, since one could create millions of colluding evil nodes and ditch the 
system. I limit it using IPv4 because it is very easy to enforce an 
homogeneously distributed network controlling the maximum number of nodes/votes 
  per IP. This limit will grow as the IPs are filled with voting power.
I already have the Sysbil protection implemented and the network of nodes 
running exchanging encrypted traffic about consensus. The only thing I have 
left are two things:
onion routing (or a faster alternative that doesn't exist but I am 
researching), chaff traffic.

...and probably more considerations. I am not expert in anon overlays, but 
perhaps we can brainstorm so I can become one : )

Thanks for reading
OA

Reply via email to