News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

What's holding Tor and I2P back from implementing message mixing and padding? : OpSec | Torhoo darknet markets

Tor is vulnerable to monitoring by a powerful global adversary who can analyze network traffic. The fact that Germany and the Netherlands currently control 50% of all Tor relays raises significant concerns about the network's integrity.

Commercial VPN services like NymVPN and Mullvad have already implemented various countermeasures, such as constant decoy data, random packet delays, and message mixing/padding, to enhance user anonymity. Given these existing solutions, it's puzzling that Tor has not adopted similar techniques to protect its users.

Why hasn't Tor incorporated these features? Is the project compromised?
Mullvad isn't a mixnet. NymVPN is somewhat of mixnet nature but needs to mature a lot. It isn't a product built with security in mind or at least by capable hands the source code tells the story.

Most users have read my posts /post/12b9f500f87bba5c3a0d and /post/5db0f0bba862e4c9a5fd whom shows only some of the risks a global adversary can pose to the Tor network, bypassing its threat model entirely. Tor does have some padding per the word features like CircuitPadding (enabled by default) and ConnectionPadding however they aren't refined enough to what you are I presume referring to.

The other very obvious issue is Tors design isn't one of a mixnet at all, it's main objective would be to achieve low latency anonymity. It has been said multiple times to achieve low latency you sacrifice some degree of anonymity as you become vulnerable to many attacks. I've said in other posts DNMs and forums shouldn't worry to sacrifice a bit of speed for additional protection as the entire thing needs stability first (as any business does).

Anything sensitive you shouldn't entirely trust Tor to keep you safe. If you are target of high value, you might stumble upon all 3 nodes in your path being within 5 eyes. LE can then deduct with high probability whom you are doing something with regardless sometimes they might not be able to see what you are doing exactly. You can adopt a layered defense approach to mitigate or offset to some level the risks.