The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind:

1. Completely decentralized.

– No critical or weak points to attack or put (il)legal pressure on.

2. Maximum resistance against all kinds of DoS attacks.

– Direct technical destructive attacks will practically be the only possible way to even attempt to stop it.

3. Theoretically secure anonymization.

– Probabilistic methods (contrary to deterministic methods) must be used in a completely decentralized design like this, where no other peer can be trusted, so focus is put on optimizing these methods.

4. Theoretically secure end-to-end transport encryption.

– This is simple in itself, but still important in the context of anonymization.

5. Completely (virtually) isolated from the “normal” Internet.

– No one should have to worry about crimes being perpetrated from their own IP address.

6. Maximum protection against identification of protocol usage through traffic analysis.

– You never know what the next draconian law might be.

7. Capable of handling larger data volumes, with acceptable throughput.

– Most existing anonymization solutions are practically unusable for (or even prohibit) larger data volumes.

8. Generic and well-abstracted design, compatible with all new and existing network enabled software.

– Software application developer participation should not be needed, it should be easy to apply the anonymization to both new and already existing products like e.g. web browsers and file transfer software.

The latest version of the source release package can always be downloaded here.

White paper describing the protocol and its design:

Paper describing the protocol implementation:

Slides from the original DEFCON 2008 presentation about the protocol:

DEFCON presentation video (speaker + slides):

DEFCON presentation video (slides only):

DEFCON presentation (audio only):