Obscuring P2P Nodes with Dandelion

Posted by ColinWright 7 days ago

Counter83Comment6OpenOriginal

Comments

Comment by supermatt 2 days ago

> A natural question is how this differs from something like Tor. In a nutshell, Tor offers identity protection before you enter a P2P network, and Dandelion offers identity protection inside the P2P network.

My understanding is that TOR also provides the latter - as that is specifically the purpose of the "onion" routing: https://en.wikipedia.org/wiki/Onion_routing

Comment by k__ 2 days ago

Yeah.

I had the impression that onion services are exactly that: protection inside the P2P network.

Comment by basedrum 2 days ago

The explanation for why Tor is different makes no sense. Instead of using a highly audited, 20 year proven, research backed protocol, let's invent something else? NIH syndrome

Comment by supermatt 2 days ago

I think it’s more that the author of the article doesn’t know what they are talking about?

The linked paper itself seems to make no such claim and actually references it for its similarity!

Comment by OutOfHere 1 day ago

Tor nodes are run by the NSA. Also, there is nothing prohibiting someone from using both Tor and Dandelion.

Comment by dpc_01234 1 day ago

Dandelion is used to improve privacy of broadcasting (cryptocurrency transactions) and comparing it to Tor is confusing. Tor is trying to hide who is talking with who, Dandylion hide who is the originator of a message that everyone will receive.

Comment by 2 days ago