Obscuring P2P Nodes with Dandelion

(johndcook.com)

83 points | by ColinWright 60 days ago

4 comments

  • supermatt 56 days ago
    > A natural question is how this differs from something like Tor. In a nutshell, Tor offers identity protection before you enter a P2P network, and Dandelion offers identity protection inside the P2P network.

    My understanding is that TOR also provides the latter - as that is specifically the purpose of the "onion" routing: https://en.wikipedia.org/wiki/Onion_routing

    • k__ 55 days ago
      Yeah.

      I had the impression that onion services are exactly that: protection inside the P2P network.

  • basedrum 55 days ago
    The explanation for why Tor is different makes no sense. Instead of using a highly audited, 20 year proven, research backed protocol, let's invent something else? NIH syndrome
    • supermatt 55 days ago
      I think it’s more that the author of the article doesn’t know what they are talking about?

      The linked paper itself seems to make no such claim and actually references it for its similarity!

    • OutOfHere 55 days ago
      Tor nodes are run by the NSA. Also, there is nothing prohibiting someone from using both Tor and Dandelion.
  • dpc_01234 54 days ago
    Dandelion is used to improve privacy of broadcasting (cryptocurrency transactions) and comparing it to Tor is confusing. Tor is trying to hide who is talking with who, Dandylion hide who is the originator of a message that everyone will receive.