Tor is the revered messaging system used by whistle-blower and drug monger alike to shroud on the internet , and as a result , it getssome attention from natural law enforcement . A new system proposed by a team of MIT resesarchers offers an option , using fake dealings to hide the real content within .

telephone Vuvuzela , it uses more dummy traffic and less encryption to hide data from user . The system relies on a chain of servers : users send their message to the first waiter , and the message is then passed on from server to waiter , each layer add another unit of ammunition of fake stochasticity , as well as passing on the content .

The final stage effect is a system that does n’t reveal any metadata about sites visited or who is talk to who : consort to the researchers , all that an perceiver would be able-bodied to discern is how many entire users are connected , and how many are disconnect .

Spacex Starship Separation

There are flaws , however : on a test hunt down on Amazon EC2 servers , the researchers simulate 1 million users , and successfully pass 15,000 substance per second , but with a response time of 44 seconds . That ’s better thaninternet over postman pigeon , but still too slow to really do anything but email .

[ MIT CSAILviaMIT intelligence ]

Security

Lilo And Stitch 2025

Daily Newsletter

Get the good technical school , science , and culture news program in your inbox daily .

News from the futurity , delivered to your present .

You May Also Like

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

Photo: Jae C. Hong

Doctor Who Omega

Roborock Saros Z70 Review

Justjune

Blue book

Spacex Starship Separation

Lilo And Stitch 2025

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

Photo: Jae C. Hong

Roborock Saros Z70 Review

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06