A friend and college of mine mentioned something that might be a good idea to set up with freedombox. The idea is to make sure it is not possible to discover who is talking to who, or which web page the owner is visiting by filling the line with noise. In other word, make traffic analysis very hard.
The idea is to send noise all the time, either by sending messages between freedomboxes, or by visiting "random" web pages all the time, and trottle down the amount of noise traffic when the user behind the box wish to visit web pages or send messages, by the same amount as the real traffic, to make sure the amount of traffic coming from a given freedombox is the same all the time. The "random" web page can for example be drawn from a shared web page history, ie the pool of web pages visited by all freedombox users, or some other way to ensure the URLs are real. The random cross traffic can for example be incorrectly encrypted traffic that can be easily rejected by the reciever with the correct private key, but which will be hard or impossible for those without the private key to differenciate from real packages. It would be a variation of the Chaffing and winnowing technique. Anyone got an idea how hard this would be to implement? -- Happy hacking Petter Reinholdtsen _______________________________________________ Freedombox-discuss mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss
