NyminnymtechOperators & Nymjas are creating the future of Nym togetherResults of the first co-creation workshop to improve community experienceAug 30
0Knowledge NetworkHow Tor Works and Why it Has Weak AnonymityIn a world where online privacy is constantly under threat, tools like Tor promise to keep our digital footprints hidden. But how effective…Jul 12Jul 12
Ania M. PiotrowskainnymtechAn empirical study of privacy, scalability, and latency of Nym mixnetWhile working on Loopix, a mix network design that Nym adopts, we developed a discrete event mix network simulator to empirically measure…Feb 27, 2021Feb 27, 2021
NyminnymtechGoodbye NymConnect, hello NymVPNNym phasing out NymConnect app in advance of coming NymVPNJun 17Jun 17
NyminnymtechOperators & Nymjas are creating the future of Nym togetherResults of the first co-creation workshop to improve community experienceAug 30
0Knowledge NetworkHow Tor Works and Why it Has Weak AnonymityIn a world where online privacy is constantly under threat, tools like Tor promise to keep our digital footprints hidden. But how effective…Jul 12
Ania M. PiotrowskainnymtechAn empirical study of privacy, scalability, and latency of Nym mixnetWhile working on Loopix, a mix network design that Nym adopts, we developed a discrete event mix network simulator to empirically measure…Feb 27, 2021
NyminnymtechGoodbye NymConnect, hello NymVPNNym phasing out NymConnect app in advance of coming NymVPNJun 17
MedusaMatrix Sharding for Enhanced Data SecurityIn the field of secure data distribution, matrix sharding is a useful technique for breaking sensitive information into several parts…Jul 20
0Knowledge NetworkStrong vs Weak AnonymityIn a surveillance-heavy digital era, protecting your online anonymity is more important than ever. This article delves into the…Jun 14
0Knowledge NetworkIntroduction to Mix NetworksMixnets are important because they can have strong anonymity, that means stronger than Tor. Tor is well known to have weak anonymity as…May 17