You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now the data exchanged between mixnodes (and also gateways) is sent "in plain". While up to this point that was a no-issue as sphinx packets themselves hide all information. With #359 an adversary observing traffic would be able to infer if given packet is sent in vpn or mix mode. Introducing some encryption between nodes, even something like using 'normal' TLS would completely solve that issue.
The text was updated successfully, but these errors were encountered:
Right now the data exchanged between mixnodes (and also gateways) is sent "in plain". While up to this point that was a no-issue as sphinx packets themselves hide all information. With #359 an adversary observing traffic would be able to infer if given packet is sent in
vpn
ormix
mode. Introducing some encryption between nodes, even something like using 'normal' TLS would completely solve that issue.The text was updated successfully, but these errors were encountered: