From fc51a51d90210986da3287261d026b8f320c92a6 Mon Sep 17 00:00:00 2001 From: Shayan Date: Wed, 27 Jun 2018 15:15:35 -0400 Subject: [PATCH] Network Privacy in Blockchains - Part 2 --- network-privacy-in-blockchains.md | 35 +++++++++++++++++++++++++++++-- 1 file changed, 33 insertions(+), 2 deletions(-) diff --git a/network-privacy-in-blockchains.md b/network-privacy-in-blockchains.md index 1a26363..697ae6a 100644 --- a/network-privacy-in-blockchains.md +++ b/network-privacy-in-blockchains.md @@ -18,12 +18,43 @@ Separate groups discussion on the network anonymization protocols (Some are fict - MimbleWimble / [Grin](https://github.com/mimblewimble/grin) - Whisper Protocol ([Ethereum](https://github.com/ethereum/wiki/wiki/Whisper)) - Tumblers +- Noise networks - Use Tor / Use Signal - Use [Wireguard](https://www.wireguard.com/) - Broadcasted Encryption - Randomized Transaction Handling -- [Kovri](https://github.com/monero-project/kovri) - Monero +- [Kovri](https://github.com/monero-project/kovri) - used in Monero. Onion routing style like tor but different approach (DHT Node discovery, Uni-directional routing (closer to free route mixnets), designed for low latency networks, probably works well for P2P but may not work well for client-server architecture). - Mixnets - +Each group posted their proposals on the window and the rest put star stickers on their preferred proposals: ![Proposals Scored by stars with a view of Montreal under construction](/img/network-privacy-in-blockchains.JPG) + +Top Rated: +- Kovri +- Dandelion + + +Research Ideas: +- Node Random Path selection + +--- + +2018.06.27 14:10-15:10 - Isis Agora Lovecruft - Part 2 + + +... [missed the beginning of the discussion] + +Discussion: +- Discussion regarding how Dandelion Protocol works, One example: [Grin Spec](https://github.com/mimblewimble/grin/blob/master/doc/dandelion/dandelion.md) +- Timing attacks by an entity that runs multiple (many) nodes in the network +- Issue with being always online on the protocols like Signal +- Mix networks High latency privacy network, pool up transactions to achieve anonymity + - Chose a route in advance by the client + - None of the nodes have access to where the transaction comes from and leaves to + - Not good when nodes are not consistently online, need more stable networks + - Cascade mixing + - At least requires one honest node on a path for everyone to use this one path + - Traffic Analysis Resistant Messaging: [katzenpost](https://github.com/katzenpost) + - Originally designed for e-voting and e-mail + - If used in Blockchain networks, it can't be used for miner nodes, as the high latency might lead to network forks and higher rate for orphaned blocks. +- Some discussion on possible attacks such as [eclipse attack](https://www.usenix.org/node/190891), [sybil attack](https://en.wikipedia.org/wiki/Sybil_attack), 51% attack.