Hi all!
An author of Maybenot here and collaborator with Mullvad on DAITA. Thanks for the warm words @ania on Maybenot. Huge fan of Loopix
First, congrats Nym on all of your efforts in finally getting a mixnet to the masses! Very happy to see more people taking traffic analysis seriously by deploying things. We’ve discussed this for decades; it’s time to get shipping
I don’t want to derail the discussion to focus on DAITA, but there’s some confusion in the thread. Here’s a fresh blog post providing more details on DAITA defenses. In gist, @Ania’s early analysis does not consider relay-side machines and their interactions with the simple client-side machines in DAITA v1. (At no fault, these details have not yet been widely discussed, and the paper has not yet been published. My bad!) Things have also changed in DAITA v2, now live on all platforms, I’ve been told by friends at Mullvad. That said, v1 DAITA should be competitive with state-of-the-art padding-only WF defenses in the academic literature (based on Interspace). V2 is better!
@SaltyYogurtt, there is no harm in Ania looking around the open-source code and sharing impressions. That’s why it’s open. Publication and sharing of ideas move the space forward. Thanks for your concerns about harm reduction, though. I’m sure @ania would follow community safety guidelines if something serious came up.
We’re also comparing apples and oranges here, which are somehow placed under a VPN umbrella. Nym tweaks a mixnet to be more usable but inadvertently lowers security in the process. DAITA tweaks WireGuard to be more secure, reducing usability by adding overhead in terms of bandwidth and delay. We have different but closely related notions of security and intended use as well.
What matters is that we care about traffic analysis resistance and are shipping! Let’s spend our energy going after the 99+% of Internet connections lacking traffic analysis defenses.
Best,
Tobias Pulls