Hiding our communications with encryption does keep your data safe, but still exposes the metadata, the information about your communications. The metadata includes IP address of the sender and receiver, which can also indicate where both parties are. The time of the communications. The size of the communications, which by itself can give a lot of clues. The Matryoshka protocol, first described in 2013, uses continuous fixed length encrypted traffic to hide all data and all metadata. Unlike TOR, which was designed by the intelligence community and exposes metadata to the intelligence community, Matryoshka offers no metadata to any party. Anonymous and untraceable communications becomes truly possible. |