End-to-end encryption is a powerful tool for protecting the privacy of Internet users. Together with the increasing use of technologies such as Tor, VPNs, and encrypted messaging, it is becoming increasingly difficult for network adversaries to monitor and censor Internet traffic. One remaining avenue for adversaries is traffic analysis: the analysis of patterns in encrypted traffic to infer information about the users and their activities. Recent improvements using deep learning have made traffic analysis attacks more effective than ever before. We present Maybenot, a framework for traffic analysis defenses. Maybenot is designed to be easy to use and integrate into existing end-to-end encrypted protocols. It is implemented in the Rust programming language as a crate (library), together with a simulator to further the development of defenses. Defenses in Maybenot are expressed as probabilistic state machines that schedule actions to inject padding or block outgoing traffic. Maybenot is an evolution from the Tor Circuit Padding Framework by Perry and Kadianakis, designed to support a wide range of protocols and use cases.
翻译:端到端加密是保护互联网用户隐私的强大工具。与 Tor、VPN 和加密消息等技术的不断增加相结合,使网络对手越来越难以监测和审查互联网流量。对手的一个剩余途径是流量分析:分析加密流量中的模式,以推断用户及其活动的信息。最近利用深度学习的改进使流量分析攻击比以往任何时候都更加有效。我们提出了 Maybenot,一个流量分析防御框架。Maybenot 设计为易于使用和集成到现有端到端加密协议中。它是使用 Rust 编程语言作为一个 crate(库)实现的,配合模拟器以进一步发展防御。Maybenot 中的防御被表述为概率状态机,用于安排动作以注入填充或阻止出站流量。Maybenot 是一种从 Perry 和 Kadianakis 的 Tor 路径填充框架演变而来的框架,旨在支持各种协议和用例。