Comment by luckystarr
2 years ago
Some day we have to use packets which are pre-filled by random data to hide our keystrokes in. Not quite steganography, but close. Could also be used to make traffic-analysis harder/impossible even?
2 years ago
Some day we have to use packets which are pre-filled by random data to hide our keystrokes in. Not quite steganography, but close. Could also be used to make traffic-analysis harder/impossible even?
The NSA and others have done this for decades. Run the line at full utilization, fully encrypted, and just put data on when you need to. Not too hard, when your lines are dedicated.
This is the only way to ensure that no information is leaked.
Yes, just make sure your timing is always the same... Any little thing will leak information.
But let's be honest rubber hose cryptography is the real way to get things done.
You could do steganography with this. There's work on getting a language model to re-word an innocuous cover-text by using a minimum-entropy, key-derived distortion of the probability distribution that is used to sample words. Then, if you use the same model on the receiver side, and have the key, you can decode the covertext back into the ciphertext. This also works with images, too. https://openreview.net/forum?id=HQ67mj5rJdR
Reminds me of numbers stations. Constantly broadcasting numbers around the world that mean something to someone . . . whenever they happen to mean something to someone. With full knowledge that the world's intelligence services (among others) are constantly listening too.
Some messaging protocols do this.
Is there a technical term for this?
I just found the term "traffic padding", which seems to accurately describe this.
in the world of VoIP it's just "constant bitrate"
Anti-timing attack? Anti-traffic analysis?
SSH traffic is encrypted, so to an observer, the packages look like random data already.
But size and timing of the packets can leak information, hence the mitigation under discussion here.
Nym?
https://nymtech.net/
Can’t get on board with a privacy tool if the first thing they ask you to do is to join their Telegram channel
2 replies →
So Tor with a blockchain, and you have to pay for it?
> Users pay a fee in NYM to send their data through the mixnet.
2 replies →
nullsoft waste