July 14, 2016 By Larry Loeb 2 min read

Riffle is a response from the Massachusetts Institute of Technology to the problems the Tor browser has been having as of late. Unlike other alternatives, MIT has a grander vision that involves doing more than just increasing the randomization of current Tor operations in memory.

MIT’s response takes the form of changing the architecture of the underlying message shuffle that goes on inside Tor, all while keeping the onion architecture that Tor pioneered.

There will be a full presentation of the new program at the Privacy Enhancing Technologies Symposium in July, which will include the researchers at MIT’s Computer Science and Artificial Intelligence Laboratory and the École Polytechnique Fédérale de Lausanne.

Learning How to Riffle

The MIT researchers proposed making a mixnet inside of Tor that randomizes packet order. It shuffles — or riffles — them at random intervals so that they no longer follow an upward and incremental order.

As the researchers explained, “Each server permutes the order in which it receives messages before passing them on to the next. If, for instance, messages from senders Alice, Bob and Carol reach the first server in the order A, B, C, that server would send them to the second server in a different order — say, C, B, A. The second server would permute them before sending them to the third and so on.”

Any cybercriminal attempting to track these messages wouldn’t have insight into the original order or origin.

This sort of change makes it harder to associate individual packets with messages. It also makes it harder to follow moving packets and build a message from them. If that’s your threat model, it’s an improvement. But it’s not the only threat model to be considered where Tor is concerned.

Don’t Forget Sybil

There is a known attack against Tor called Sybil, and Riffle addresses it directly. To thwart message tampering, Riffle uses a technique called a verifiable shuffle, which is a method of encryption and authentication for messaging.

MIT stated that each exchange passes a temporary encryption key. Once verified, the rest of the message exchange does not have to use that encryption key. The parties involved are trusted, but verified.

Something the researchers will no doubt be questioned about at the July presentation is their claim that file transfers on Riffle required only one-tenth of the time as other anonymity networks, Softpedia reported. But if Riffle is as effective as it claims, and other Tor advancements continue to take hold, anonymous browsing may become more popular than ever.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today