Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

DIVAS INTERNATIONAL MUSIC FESTIVAL: ‘Voices That Heal’ — A Celebration of Women, Music & Empowerment

2026-01-25

Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H

2026-01-24

Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion

2026-01-24
Facebook X (Twitter) Instagram
Trending
  • DIVAS INTERNATIONAL MUSIC FESTIVAL: ‘Voices That Heal’ — A Celebration of Women, Music & Empowerment
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Breaking News»Vuvuzela, a next-generation anonymity tool that protects users by adding NOISE
Breaking News

Vuvuzela, a next-generation anonymity tool that protects users by adding NOISE

Gugu LourieBy Gugu Lourie2015-12-19No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cryptography is the science of keeping secrets, with encryption algorithms and methods such as public key encryption the gold standard. Despite widespread usage and heavy scrutiny, these ciphers remain unbroken. But while encryption can keep messages secret, it cannot protect the identities of the sender and receiver. By Martin Berger


Details such as the IP addresses of computers communicating on the internet and other metadata can reveal more than just the identities of those communicating. Companies use metadata to infer sexual orientation, approximate age, gender and interests for targeted advertising, while intelligence and law enforcement agencies collect and analyse it for their own uses. As a former director of the NSA puts it pithily: “We kill people based on metadata.”

So anonymity is required as well as secrecy, for which the most polished tool is Tor. Tor allows users to browse the web anonymously, but has come under sustained attack – and cracks have begun to show. Is it time for a replacement? Vuvuzela, a prototype anonymising software designed by MIT researchers, is one attempt.

Tor achieves anonymity by partially encrypting as much metadata as possible, revealing only small amounts and only as late on in the communication as possible. It sends messages via the encrypted Tor network, where it’s difficult for attackers that snoop on network traffic to detect where a message comes from and where it is going. That an NSA presentation leaked by Edward Snowden included the statement “Tor Stinks” suggests that even the NSA found it difficult to crack.

Yet when the FBI shut down the Silk Road and Silk Road 2.0 illegal online marketplaces, their prosecutions seemingly relied on evidence collected despite Tor’s privacy measures. Tor has well-known security weaknesses which are explicitly stated by the developers. One is that Tor cannot withstand traffic analysis by an attacker who can monitor global internet traffic in real time: whenever user A sends a message to Tor and almost immediately afterwards Tor sends a message to website B, then it is likely that A uses Tor to browse B. This attack is out of reach for individuals, but some nation states have the capacity to do so.

As MIT associate professor Nickolai Zeldovich, whose group created Vuvuzela, said: “Tor operates under the assumption that there’s not a global adversary that’s paying attention to every single link in the world. Maybe these days this is not a good assumption.”

 

Anonymity through obscurity. Guy Mayer, CC BY-NC-ND

Hiding activity as well as metadata

To overcome Tor’s shortcomings, other anonymising software approaches have been proposed, such as Riposte from Stanford University and Dissent from Yale. While they fix Tor’s flaws, they are not able to support the sort of usage and number of concurrent users that Tor can, which limits their usefulness.

Vuvuzela is both immune to traffic analysis and other forms of attack, and can support a large number of simultaneous active users. Like Tor, Vuvuzela works by encrypting as much metadata as possible, but (like its namesake) it also adds a lot of noise – fake messages with which to confuse attackers. As they are indistinguishable from genuine messages, this drowns out patterns of genuine communication that might otherwise compromise a user’s anonymity.

Unlike Tor, Vuvuzela sends its communication in fixed rounds. Clients cannot send and receive messages at any time, instead on each round a user can only send and receive one message. This obscures the precise timing of messages between sender and receiver, keeping this detail from attackers.

Another difference is how the messages travel. Tor messages pass from sender to receiver in a sequence of hops, while Vuvuzela uses a dead-drop system, where the sender leaves the message at a randomly chosen memory location on one of the Vuvuzela servers, and during a later round the recipient picks up the message.

All messages sent by Vuvuzela messages are the same size, achieved by splitting messages that are too large and padding messages that are too small. This prevents attackers from using message size to compromise anonymity by giving away clues as to what sort of communication is being sent.

As a result, Vuvuzela is the first anonymising privacy system that is resistant to large-scale network traffic analysis attacks, and which can also sustain millions of active users sending tens of thousands of messages per second.

MIT’s software is brand new and still experimental, and cannot yet be considered as a replacement for Tor. It hasn’t yet undergone extensive testing through attacks aimed at its theoretical design, and implementation. Crucially, unlike Tor Vuvuzela cannot yet be used for convenient web browsing, nor is it suitable for real-time chat as it is currently quite slow. However, it holds a lot of promise, and may evolve into a viable Tor successor in the future.

  • Martin Berger is a Lecturer in Foundations Of Computation (Informatics), University of Sussex
  • This article was originally published on The Conversation
  • Email TechFinancials.co.za at [email protected]

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Gugu Lourie
Gugu Lourie

Related Posts

Chery SA to Buy Nissan Rosslyn Plant, Save Jobs

2026-01-23

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12

How SA’s Largest Wholesale Network is Paving the Way for a Connected, Agile Future

2025-12-02

Oni-Tel Launches Inter-Data Centre Fibre Network With Digital Parks Africa As First Point Of Presence

2025-11-27

Vodacom Announces Multi-Year Strategic Collaboration With Google Cloud to Boost Africa’s AI Advancement

2025-11-25

Telkom Consumer Fuels Growth With Prepaid, Data Strategy

2025-11-18

Digital Public Infrastructure: The Need for Leadership And Sovereignty In South Africa’s Digital Future

2025-11-03
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Chery SA to Buy Nissan Rosslyn Plant, Save Jobs

In a major development for South Africa’s automotive industry, Nissan and Chery SA have reached…

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Why Legal Businesses Must Lead Digital Transformation Rather Than Chase It

2026-01-23

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

Over R270M In Phuthuma Nathi Dividends Remain Unclaimed

2025-11-27

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

DIVAS INTERNATIONAL MUSIC FESTIVAL: ‘Voices That Heal’ — A Celebration of Women, Music & Empowerment

2026-01-25

Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H

2026-01-24

Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion

2026-01-24
Recent Posts
  • DIVAS INTERNATIONAL MUSIC FESTIVAL: ‘Voices That Heal’ — A Celebration of Women, Music & Empowerment
  • Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H
  • Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion
  • GeeFi’s (GEE) Phase 3 Hits 90% as New App and Roadmap Update Highlights Stronger Privacy Focus Than Tron (TRX)
  • AI Girlfriend Applications Tested for Context Awareness and Personalization
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.