Description
Riffle is ten times faster than tor while being written in a slower language then Tor (golang instead of Clang) It supports the hybrid verifiable shuffle to enforce the rule that no node will tamper with traffic, once the TLS connection has been initiated, it uses faster authentication encryption to secure the connection by refusing to foreword tampered traffic. To enforce this, future py-IPv8 nodes that tamper with traffic or perform SSL downgrade attacks will have their trust token balance reset and paid to the victim that caught them, if they have a positive balance, they will receive trust tokens, if their balance is negative, the victim will earn 10% more for the next 2 weeks. The malicious node's address will be permanently banned from the network. The difference between the hybrid variable shuffle and authentication encryption is that the hybrid verifiable shuffle requires each node prove to the rest of the network that they are not tampering with traffic, but it is slow. Authentication encryption requires each node to refuse to forward tampered traffic and to report the node behind them, if they do not refuse to forward the tampered traffic, they will be reported instead. I will like the paper here.