This is Riffle, the anonymous internet that improves TOR

TOR is a safe system, but with its small flaws. That's why Riffle was born, which promises to be like TOR, but without its flaws

TOR is a safe system, but with its small flaws. That's why Riffle was born, which promises to be like TOR, but without its flaws

We have just found out about a new project that has caught our attention. It's about Riffle, a new anonymous internet system based on TOR, but with the difference that it will try to cover its weaknesses.

People who know the TOR network a little, will know that their system to hide the IP address is through additional nodes between source and destination. These route changes make the connection anonymous, since let's say you completely lose track of who sent the connection.

Well, this system it has a very serious weak point. The main weak point of TOR is that if a person manages to know all the nodes through which a connection has traveled, they can follow them and find out where the message is coming from, destroying anonymity.

For this reason, the Riffle system has been developed from Switzerland, a system based on TOR but that covers its main deficiencies with additional security systems. First, not only is the data sent to a single node as it was in Tor, but it is sent to several, thus making it difficult to trace.

But the thing does not stop there, since Riffle The order of the nodes to which the packets are sent also changes.. Joining this with the first measure, we have groups of users and nodes formed, the nodes having data from more than one user. Thanks to this, it will be almost impossible to trace a network to detect the identity of a user.

Riffle is still in development and cannot be installed as details remain to be polished. To whet your appetite, we have here a link to a Official PDFfrom the creator of Riffle, explaining how this works With every little detail.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Raul P. said

    Azpe, the title of the article is nonsense.