P2PRIV separates anonymization from user data transport. Before sending data, signalization tokens are forwarded over classical anonymous cascades towards formation of so-called cloning cascades (CC). The well-known anonymous techniques (i.e. Mix network and Crowds' Random walk algorithm) are utilized in hiding the initiator of the CC. Then, after a random interval of time, each CC member (i.e. group of clones and the true initiator) communicates directly and independently with destination nodes. A process of finding the true initiator among network nodes is hard to perform even for an adversary able to collude a significant part of overlay network.
P2PRIV requires a fully distributed network with distributed information content to assure high-anonymous access to its resources. A utility of P2PRIV in client-server like services, e.g., World Wide Web system, or in hybrid P2P topologies, is problematic in its current form.
"Protégez votre surf sur Internet". Archived from the original on 2012-05-28. https://web.archive.org/web/20120528230440/http://p2priv.org/news/website_launched ↩
"Protégez votre surf sur Internet". Archived from the original on 2012-05-28. https://web.archive.org/web/20120528230440/http://p2priv.org/news ↩