FINDING · DETECTION

Traffic analysis is identified as the primary threat to location secrecy in a distributed anonymous storage system: if an adversary can correlate inter-server communications or link requests to stored file locations, it can target physical seizure. The paper proposes mix-nets (Chaum 1981) for user-facing file delivery and dining-cryptographers ring protocols for inter-server communications, supplemented by traffic padding, so that even traffic analysis yields no actionable location information.

From 1996-anderson-eternityThe Eternity Service · §4.5 · 1996 · Theory and Applications of Cryptology

Implications

Tags

censors
generic
techniques
flow-correlation
defenses
meta-resistancerandomization

Extracted by claude-sonnet-4-6 — review before relying.