Go to file
2020-04-23 04:49:39 -05:00
src use argparse and make yam an executable script 2020-04-23 04:23:57 -05:00
tests use argparse and make yam an executable script 2020-04-23 04:23:57 -05:00
.gitignore updated gitignore 2020-04-23 04:29:35 -05:00
.travis.yml don't need verbose tar in ci 2020-04-23 04:49:39 -05:00
CHANGELOG.md use argparse and make yam an executable script 2020-04-23 04:23:57 -05:00
dummy.png fixes and added images 2020-04-20 06:15:19 -05:00
LICENSE initial commit 2020-04-16 06:41:49 -05:00
Makefile added stuff for CI 2020-04-23 04:36:55 -05:00
no-dummy.png fixes and added images 2020-04-20 06:15:19 -05:00
README.md updated readme 2020-04-23 04:30:05 -05:00
requirements.in added stuff for CI 2020-04-23 04:34:51 -05:00
requirements.txt added stuff for CI 2020-04-23 04:34:51 -05:00
run_tests.sh initial commit 2020-04-16 06:41:49 -05:00
setup.cfg initial commit 2020-04-16 06:41:49 -05:00
setup.py use argparse and make yam an executable script 2020-04-23 04:23:57 -05:00

youandme

Build Status

Python library to share data anonymously and securely* with limited traffic metadata.

* The ID one connects to a host with must be shared via a secure (private, authenticated) channel.

$ pip install youandme

why

In normal socket connections, Eve can see when Alex and Bob communicate and the size of their communications.

This library sends continuous streams of data (null bytes) even when no information is being communicated, in order to increase unobservability of transmission times and packet sizes.

Anonymity and encryption is provided via Tor onion services, though this library could easily be adapted to use plaintext (and encryption by an application) or another relay like I2P.

security

As stated above, this library does no authentication. However, if the ID is shared privately and safely, the tunnel will have roughly the security of a Tor v3 onion service, with increased metadata unobservability.

What an attacker sees in a normal Tor connection

What an attacker sees in a youandme connection