Matryoshka Protocol

Hiding our communications with encryption does keep your data safe, but still exposes the metadata, the information about your communications.

The metadata includes IP address of the sender and receiver, which can also indicate where both parties are.

The time of the communications.

The size of the communications, which by itself can give a lot of clues.

The Matryoshka protocol, first described in 2013, uses continuous fixed length encrypted traffic to hide all data and all metadata.

Unlike TOR, which was designed by the intelligence community and exposes metadata to the intelligence community, Matryoshka offers no metadata to any party.

Anonymous and untraceable communications becomes truly possible.

ShofarNexus™ShofarNexus.comShofarNexus.Com

2023

2019

2018

2015

2013

2012

Friday, September 7, 2018

A quick reminder of history

Friday, September 7, 2018

Convenient, Cool, and Free

Friday, September 7, 2018

Vital Concepts

Friday, September 7, 2018

Patching the Problem

Friday, September 7, 2018

Solving the Problem

Friday, September 7, 2018

Domain Name System

Friday, September 7, 2018

Email Services

Friday, September 7, 2018

Matryoshka Protocol

Friday, September 7, 2018

Private Routing

Friday, September 7, 2018

Untraceable Cellphone

Friday, September 7, 2018

Portfolios

Friday, September 7, 2018

Business Model