Go to file
2020-04-20 06:15:19 -05:00
src fixes and added images 2020-04-20 06:15:19 -05:00
tests we now have two way communication 2020-04-20 03:36:41 -05:00
.gitignore we now have two way communication 2020-04-20 03:36:41 -05:00
.travis.yml initial commit 2020-04-16 06:41:49 -05:00
CHANGELOG.md initial commit 2020-04-16 06:41:49 -05:00
dummy.png fixes and added images 2020-04-20 06:15:19 -05:00
LICENSE initial commit 2020-04-16 06:41:49 -05:00
Makefile initial commit 2020-04-16 06:41:49 -05:00
no-dummy.png fixes and added images 2020-04-20 06:15:19 -05:00
README.md fixes and added images 2020-04-20 06:15:19 -05:00
requirements.in initial commit 2020-04-16 06:41:49 -05:00
requirements.txt initial commit 2020-04-16 06:41:49 -05:00
run_tests.sh initial commit 2020-04-16 06:41:49 -05:00
setup.cfg initial commit 2020-04-16 06:41:49 -05:00
setup.py fixes and added images 2020-04-20 06:15:19 -05:00

youandme

Python library to share data anonymously and securely* with limited traffic metadata.

* The ID one connects to a host with must be shared via a secure (private, authenticated) channel.

$ pip install youandme

why

In normal socket connections, Eve can see when Alex and Bob communicate and the size of their communications.

This library sends continuous streams of data even when no information is being communicated, in order to increase unobservability of transmission times and packet sizes.

Anonymity and encryption is provided via Tor onion services, though this library could easily be adapted to use plaintext (and encryption by an application) or

security

As stated above, this library does no authentication. However, if the ID is shared privately and safely, the tunnel will have roughly the security of a Tor v3 onion service, with increased metadata unobservability.

What an attacker sees in a normal Tor connection

What an attacker sees in a youandme connection