This sounds very similar to nostr onion routing @Arjen et al worked on at #SEC, do you have a link to that repo? We spoke about this with Claudia Diaz, who I think poked a couple holes in the naive approach of doing this. Probably using a carefully designed mixnet like nym has stronger privacy guarantees, but these nostr hacks at least work easy in the browser.

Replies (3)

Arjen's avatar
Arjen 3 months ago
The main argument she made was that if the adversary is observing both ends of the network. So if they see anything before the tor/mixnet and after the exit node, then they can correlate traffic. @Max prob refers to Epoxy, my project attempting to do multi-hop publishing to nostr relays. It is indeed similar to your solution @Laan Tungir . My solution was to do subscriptions to relays over multiple hops and different networks (clearnet->i2p->tor->clearnet for example) epoxy: the site for testing it: You should check out @PABLOF7z 's onion routing spec, (can't find the repo now). He included padding and sats in the route as well.