Skip to content

a framework for traffic analysis defenses

License

Unknown, MIT licenses found

Licenses found

Unknown
LICENSE-APACHE
MIT
LICENSE-MIT
Notifications You must be signed in to change notification settings

mullvad/maybenot

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Maybenot

Maybenot is a framework for traffic analysis defenses that hide patterns in encrypted communication. Its goal is to increase the uncertainty of network attackers, hence its logo 🤔 - the thinking face emoji (U+1F914).

Consider encrypted communication protocols such as TLS, QUIC, WireGuard, or Tor. While the connections are encrypted, patterns in the encrypted communication may still leak information about the communicated plaintext. Maybenot is a framework for creating defenses that hide such patterns.

Workspace structure

The Maybenot workspace consists of the following crates:

More crates are being added to the workspace. First up should be an FFI crate for the framework.

More details

This is v2 of the framework and associated crates. The goal is to keep the framework as simple as possible, while still being expressive enough to implement a wide range of defenses and useful to integrators.

See the WPES 2023 paper for background on v1 of the framework. The documentation is updated for v2. The arXiv design document is in the process of being updated for version 2.

Development of defenses using Maybenot is under active development. For some early results targeting v1 of the framework, see https://github.com/ewitwer/maybenot-defenses. Defenses and tooling targeting v2 of the framework will soon be available.

Contributing

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as MIT or Apache-2.0, without any additional terms or conditions.

Origin

Maybenot is based on the Circuit Padding Framework of Tor by Perry and Kadianakis from 2019, which is a generalization of the WTF-PAD Website Fingerprinting Defense design by Juarez et al. from 2016, which in turn is based on the concept of Adaptive Padding by Shmatikov and Wang from 2006.

Sponsorship

Made possible with support from Mullvad VPN, the Swedish Internet Foundation, and the Knowledge Foundation of Sweden.

About

a framework for traffic analysis defenses

Resources

License

Unknown, MIT licenses found

Licenses found

Unknown
LICENSE-APACHE
MIT
LICENSE-MIT

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Rust 98.2%
  • C 1.6%
  • Makefile 0.2%