We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

The Nym Mixnet

Formal Metadata

Title
The Nym Mixnet
Subtitle
Intro to a new anonymous communication network
Title of Series
Number of Parts
542
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
This talk will be about Nym, a new anonymous overlay network for the internet based on mixnet. Unlike other privacy-enhanced technologies like OpenVPN and Tor, Nym defends against global passive adversaries that have a "God's eye" view of the entire network, like the NSA. Nym does this by mixing internet packets at nodes so they do not exit the mixnet in FIFO, as well as adding fake traffic. Like Tor, any application and use SOCKS proxies to bind to Nym. As Nym is built in Rust, it also allows WebSockets and other direct integration. We can demonstrate how the Nym mix network hides network-level metadata from everything from Bitcoin to Telegram. Nym has been supported by both H2020 PANORAMX and Next Generation Internet projects on the EU level. Although the original project was started by a Neuchatel-based startup, the project takes contributions from volunteers. Mix nodes are ran in a decentralized manner and keep track of their reputation using the NYM token. Currently, there are approximately 500 mix nodes, but new nodes and applications are welcome. Nym works well for asynchronous, message-based traffic like instant messaging and e-mail, while Tor works better for synchronous, circuit-based traffic like Web browsing. Both projects should be able to work together to provide full-privacy for users.