Matryoshka Protocol
Day: Friday September 7, 2018 ● #1

Hiding our communications with encryption does keep your data safe, but still exposes the metadata, the information about your communications.

The metadata includes IP address of the sender and receiver, which can also indicate where both parties are.

The time of the communications.

The size of the communications, which by itself can give a lot of clues.

The Matryoshka protocol, first described in 2013, uses continuous fixed length encrypted traffic to hide all data and all metadata.

Unlike TOR, which was designed by the intelligence community and exposes metadata to the intelligence community, Matryoshka offers no metadata to any party.

Anonymous and untraceable communications becomes truly possible.

ShofarNexus™ ● ShofarNexus.comShofarNexus.Shofar

A quick reminder of history

Fri, Sep 7, 2018

Convenient, Cool, and Free

Fri, Sep 7, 2018

Vital Concepts

Fri, Sep 7, 2018

Patching the Problem

Fri, Sep 7, 2018

Solving the Problem

Fri, Sep 7, 2018

Domain Name System

Fri, Sep 7, 2018

Email Services

Fri, Sep 7, 2018

Matryoshka Protocol

Fri, Sep 7, 2018

Private Routing

Fri, Sep 7, 2018

Untraceable Cellphone

Fri, Sep 7, 2018

Portfolios

Fri, Sep 7, 2018

Business Model

Fri, Sep 7, 2018