July 14, 2016 By Larry Loeb 2 min read

Riffle is a response from the Massachusetts Institute of Technology to the problems the Tor browser has been having as of late. Unlike other alternatives, MIT has a grander vision that involves doing more than just increasing the randomization of current Tor operations in memory.

MIT’s response takes the form of changing the architecture of the underlying message shuffle that goes on inside Tor, all while keeping the onion architecture that Tor pioneered.

There will be a full presentation of the new program at the Privacy Enhancing Technologies Symposium in July, which will include the researchers at MIT’s Computer Science and Artificial Intelligence Laboratory and the École Polytechnique Fédérale de Lausanne.

Learning How to Riffle

The MIT researchers proposed making a mixnet inside of Tor that randomizes packet order. It shuffles — or riffles — them at random intervals so that they no longer follow an upward and incremental order.

As the researchers explained, “Each server permutes the order in which it receives messages before passing them on to the next. If, for instance, messages from senders Alice, Bob and Carol reach the first server in the order A, B, C, that server would send them to the second server in a different order — say, C, B, A. The second server would permute them before sending them to the third and so on.”

Any cybercriminal attempting to track these messages wouldn’t have insight into the original order or origin.

This sort of change makes it harder to associate individual packets with messages. It also makes it harder to follow moving packets and build a message from them. If that’s your threat model, it’s an improvement. But it’s not the only threat model to be considered where Tor is concerned.

Don’t Forget Sybil

There is a known attack against Tor called Sybil, and Riffle addresses it directly. To thwart message tampering, Riffle uses a technique called a verifiable shuffle, which is a method of encryption and authentication for messaging.

MIT stated that each exchange passes a temporary encryption key. Once verified, the rest of the message exchange does not have to use that encryption key. The parties involved are trusted, but verified.

Something the researchers will no doubt be questioned about at the July presentation is their claim that file transfers on Riffle required only one-tenth of the time as other anonymity networks, Softpedia reported. But if Riffle is as effective as it claims, and other Tor advancements continue to take hold, anonymous browsing may become more popular than ever.

More from

Trends: Hardware gets AI updates in 2024

4 min read - The surge in artificial intelligence (AI) usage over the past two and a half years has dramatically changed not only software but hardware as well. As AI usage continues to evolve, PC makers have found in AI an opportunity to improve end-user devices by offering AI-specific hardware and marketing them as "AI PCs."Pre-AI hardware, adapted for AIA few years ago, AI often depended on hardware that was not explicitly designed for AI. One example is graphics processors. Nvidia Graphics Processing…

Cybersecurity Awareness Month: Cybersecurity awareness for developers

3 min read - It's the 21st annual Cybersecurity Awareness Month, and we’re covering many different angles to help organizations manage their cybersecurity challenges. In this mini-series of articles, we’re focusing on specific job roles outside of cybersecurity and how their teams approach security.For developers, cybersecurity has historically been a love-hate issue. The common school of thought is that coders are frustrated with having to tailor their work to fit within cybersecurity rules. However, many companies are embracing a security-first approach, and some developers…

Spooky action: Phantom domains create hijackable hyperlinks

4 min read - According to a recent paper published at the 2024 Web Conference, so-called "phantom domains" make it possible for malicious actors to hijack hyperlinks and exploit users' trust in familiar websites.The research defines phantom domains as active links to dot-com domains that have never been registered.Here's what enterprises need to know about how phantom domains emerge, the potential risks they represent and what they can do to disrupt phantom attacks. There are two common types of phantom domains: Errors and placeholders.Domain errorsErrors…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today