] The complex version: Onion Routing is a connection-oriented ] anonymizing communication service. Users choose a ] source-routed path through a set of nodes, and negotiate a ] "virtual circuit" through the network, in which each node ] knows its predecessor and successor, but no others. Traffic ] flowing down the circuit is unwrapped by a symmetric key at ] each node, which reveals the downstream node. What about traffic analysis? While I don't know much about this, I had a talk about this very same thing with Decius not too long ago. Don't you need some type of anonymous cloud takes and "holds" your request for some random length of time? That way if enough people are inject requests into the cloud, there is no way to match an incoming transmition cloud with one leaving the cloud. RE: Onion Routing 2.0: tor |