Tor vs ShadowNet - Unlinkability Comparison
In this video I show you the comparison of Tor and ShadowNet in being anonymous and identifiably unlinkable.
In this video I show you the comparison of Tor and ShadowNet in being anonymous and identifiably unlinkable.
Fixed 2 issues that were a problem:
ICMP (Was not consistently staying disabled)
Killswitch (Was leaking host ip due to weak ip rules)
All other features should be working fine. Enjoy being a Ghost on Kali Linux and Parrot os Boys!!!
In this video you can see the outgoing traffic to the internet is 100kbit-1mbit.
No browsers are opened up on my Parrot OS it's just the terminal and nothing else, still you see traffic leaving my computer in flows of 100kbit-1mbit.
This proves the cover traffic of ShadowNet!
Even when you are not doing anything and are idle, traffic flows to the internet and makes it seem like you are doing something even when you are not.
When this happens, the packets released to the internet are fixed at 1200bytes (1156-1186)
The NSA or CIA can never track via the packet analysis method ever again! Use ShadowNet Today (v2.0.0 Officially released) ONLY FOR KALI LINUX AND PARROT OS
Sphinx like Packets Fixed at 1200 as you can see.
When using ShadowNet if you ever see 54 and 590 once or twice and the rest 1200, these are just to check that there is a valid connection/ tor sending the system data that it send back/out.
You can see the jitter traffic working reordering, shuffling and sending packets out at random times with a random delay.
12.5ms THEN 105ms THEN 13 again. this mitigate timing analysis, now the NSA cannot say you connected at this time and left at this time. You will never leave out the way you walked in.
DOWNLOAD SHADOWNET TODAY. free and open source
ShadowNet is an Anonymous P2P network that routes your traffic through Tor while implementing Mixnet techniques inspired by the Nym Mixnet Infrastructure.
here you can see the live view of the Sphinx like packets in action while im watching a video.
Having a consistent Jitter and around 1200bytes, and NSA / CIA member would not know what you are doing because packets are fixed at 1200bytes. DOWNLOAD SHADOWNET TODAY
for free.
Most privacy guides tell you to "blend in" with Tor. But if an adversary like the NSA or CIA is watching your specific connection, "blending in" isn't enough to stop Traffic Correlation. I’ve been testing a protocol called ShadowNet that changes the game by moving from "Crowd Anonymity" to "Signal Erasure."
The Fundamental Difference
Tor (The Onion Standard)
The Strategy: Safety in numbers. You try to look like every other Tor user.
The Vulnerability: If you are the only Tor user in your area, or if you have a unique browsing pattern (downloading a 7GB ISO), you stand out. Tor is "leaky" regarding Timing and Volume. A GPO can link your home's data spikes to the exit node's activity.
ShadowNet (The Sovereign Shield)
The Strategy: Total decoupling of human intent from network signal.
The Strength: ShadowNet does not rely solely on a crowd. Even if you are the only person on earth using it, your traffic remains unlinkable. It doesn't just hide your identity; it erases your "signature."
Why ShadowNet Wins Against a GPO
Unlinkable Uniqueness: In Tor, being "unique" is a death sentence (fingerprinting). In ShadowNet, uniqueness is irrelevant. Because of the 0.9s Asynchronous Jitter, the rhythm of your packets is shredded at the kernel level. Even if a GPO knows you are sending data, they cannot mathematically link your packets to any specific action or website.
The 100kbits "Flat-Line" (Volumetric Masking): Tor's bandwidth spikes when you do something. ShadowNet maintains a constant 1mbit "Background Hum" 24/7. Whether you are downloading a massive file or sitting idle, your ISP sees the exact same static pulse. You aren't "blending in" with others; you are becoming indistinguishable from background noise.
The Sphinx Lock (Hardware Integrity): ShadowNet kills hardware "shortcuts" like GSO/TSO that leak data patterns. By forcing every packet into a uniform 1200b slice, it removes the "Size Fingerprint" that even Tor sometimes leaves behind.
The Final Verdict
Anonymity: Tor is a crowd; ShadowNet is a Ghost. * Privacy: Tor hides your destination; ShadowNet hides your behavior.
Security: ShadowNet hardens the OS itself—morphing your TTL to 128 to mimic Windows and killing WebRTC/IPv6 leaks at the root.
If you want to be anonymous among users, use Tor. If you want to be unlinkable to a Global Observer, you need ShadowNet.
[ Removed by Reddit on account of violating the content policy. ]
Most privacy guides tell you to "blend in" with Tor. But if an adversary like the NSA or CIA is watching your specific connection, "blending in" isn't enough to stop Traffic Correlation. I’ve been testing a protocol called ShadowNet that changes the game by moving from "Crowd Anonymity" to "Signal Erasure."
The Fundamental Difference
Tor (The Onion Standard)
The Strategy: Safety in numbers. You try to look like every other Tor user.
The Vulnerability: If you are the only Tor user in your area, or if you have a unique browsing pattern (downloading a 7GB ISO), you stand out. Tor is "leaky" regarding Timing and Volume. A GPO can link your home's data spikes to the exit node's activity.
ShadowNet (The Sovereign Shield)
The Strategy: Total decoupling of human intent from network signal.
The Strength: ShadowNet does not rely solely on a crowd. Even if you are the only person on earth using it, your traffic remains unlinkable. It doesn't just hide your identity; it erases your "signature."
Why ShadowNet Wins Against a GPO
Unlinkable Uniqueness: In Tor, being "unique" is a death sentence (fingerprinting). In ShadowNet, uniqueness is irrelevant. Because of the 0.9s Asynchronous Jitter, the rhythm of your packets is shredded at the kernel level. Even if a GPO knows you are sending data, they cannot mathematically link your packets to any specific action or website.
The 1mbit "Flat-Line" (Volumetric Masking): Tor's bandwidth spikes when you do something. ShadowNet maintains a constant 1mbit "Background Hum" 24/7. Whether you are downloading a massive file or sitting idle, your ISP sees the exact same static pulse. You aren't "blending in" with others; you are becoming indistinguishable from background noise.
The Sphinx Lock (Hardware Integrity): ShadowNet kills hardware "shortcuts" like GSO/TSO that leak data patterns. By forcing every packet into a uniform 1200b slice, it removes the "Size Fingerprint" that even Tor sometimes leaves behind.
The Final Verdict
Anonymity: Tor is a crowd; ShadowNet is a Ghost. * Privacy: Tor hides your destination; ShadowNet hides your behavior.
Security: ShadowNet hardens the OS itself—morphing your TTL to 128 to mimic Windows and killing WebRTC/IPv6 leaks at the root.
If you want to be anonymous among users, use Tor. If you want to be unlinkable to a Global Observer, you need ShadowNet.
The first ever Combination of Tor with Mixnet techniques inspired by the Nym Mixnet Infrastructure.
This is not just a regular system wide Tor Routing tool, this implements similar methods that the Nym Mixnet uses:
Key Features:
Sphinx like Packets: (Packets are fixed at 1200bytes) no matter what you do. Sending an email, watching a video, State-level agencies won't know what you are doing.
Cover Traffic: A constant heart beat 1mbit data is sent, even if you are idle and not doing anything. this is sent to hide whether you are active or away from your device.
Delayed Fixed Timing: The timing of Packets sent are delayed at 100ms, delaying the processing time.
and more!
please read the README.md. If you don't want to pay for your anonymity like with NymVPN, then you don't have to.
Use ShadowNet today!