Remix.run Logo
Obscuring P2P Nodes with Dandelion(johndcook.com)
83 points by ColinWright 7 days ago | 7 comments
supermatt 2 days ago | parent | next [-]

> A natural question is how this differs from something like Tor. In a nutshell, Tor offers identity protection before you enter a P2P network, and Dandelion offers identity protection inside the P2P network.

My understanding is that TOR also provides the latter - as that is specifically the purpose of the "onion" routing: https://en.wikipedia.org/wiki/Onion_routing

k__ 2 days ago | parent [-]

Yeah.

I had the impression that onion services are exactly that: protection inside the P2P network.

basedrum 2 days ago | parent | prev | next [-]

The explanation for why Tor is different makes no sense. Instead of using a highly audited, 20 year proven, research backed protocol, let's invent something else? NIH syndrome

supermatt 2 days ago | parent | next [-]

I think it’s more that the author of the article doesn’t know what they are talking about?

The linked paper itself seems to make no such claim and actually references it for its similarity!

OutOfHere 2 days ago | parent | prev [-]

Tor nodes are run by the NSA. Also, there is nothing prohibiting someone from using both Tor and Dandelion.

dpc_01234 a day ago | parent | prev | next [-]

Dandelion is used to improve privacy of broadcasting (cryptocurrency transactions) and comparing it to Tor is confusing. Tor is trying to hide who is talking with who, Dandylion hide who is the originator of a message that everyone will receive.

2 days ago | parent | prev [-]
[deleted]