Nym (mixnet)
Nym is an evolving mix network, a type of computer network infrastructure for privacy that masks user metadata, separating source and destination IP addresses. It anonymizes various types of communication, including messaging, files transfers, payments transactions, and web browsing on basic websites. The project is built on free and open-source software and is decentralized, maintained by a distributed set of independent nodes worldwide. It is developed by Nym Technologies.
Nym is sometimes compared to anonymity networks such as Tor and I2P, although it differs in some aspects. Unlike these, Nym does not support hidden services.
Data packets sent through the Nym mixnet are encrypted in multiple layers and routed through a series of nodes, including an entry gateway, three "mix nodes", and an exit gateway to the internet. To mitigate traffic analysis risks, packets are standardized to a uniform size, mixed with cover traffic, and transmitted with randomized timing to obscure traffic patterns. These methods aim to make it more difficult for adversaries with broad surveillance capabilities to correlate incoming and outgoing data flows.
Users can interact with the network via "NymVPN", a client application, or integrate Nym functionality into third-party applications using its software development kit.
History
The concept of a mix network was introduced by David Chaum in 1979 and later published in 1981. The cypherpunk movement contributed to the development of mixnets in the 1990s, though their practical applications remained limited, primarily in the form of anonymous remailers. In the 2000s, some anonymous communication networks—most notably Tor—incorporated principles of mixnets, though Tor itself is based on onion routing rather than a mixnet implementation.The Nym mixnet originates from two Horizon 2020 research projects funded by the European Commission following the revelations on mass internet surveillance by the U.S. and U.K. governments: Panoramix and NEXTLEAP.
The mixnet originates from academic research, with technologies associated with the project regularly presented at scientific conferences in cybersecurity and cryptography, including USENIX, NDSS, and Privacy Enhancing Technologies Symposium.
These projects contributed to advancements in mixnet technologies, leading to the foundations of Nym in 2017:
- Harry Halpin, then a computer scientist at INRIA, conceived of the idea after a discussion with Adam Back in 2017 on how to improve online privacy through a decentralized computing network that could take advantage of spare computing power to mix packets.
- Cryptographers Ania Piotrowska and George Danezis of University College London introduced the "Loopix" architecture, which influenced Nym. Loopix integrated existing privacy-enhancing techniques to strengthen mixnet properties, including "Sphinx" packet format, cover traffic, exponential mixing delays, a layered network topology, and Poisson-process-based packet transmission.
In 2021, Chelsea Manning, a former U.S. Army intelligence analyst and whistleblower, conducted a security audit of Nym to identify potential vulnerabilities. In January 2022, she joined the Nym development team as a security consultant and public relations advisor.
The launch of the live Nym network took place on April 14, 2022, at Station F in Paris, with Edward Snowden as a keynote speaker. In June 2022, Claudia Diaz, Harry Halpin, and Aggelos Kiayias introduced a reward-sharing scheme designed to incentivize operators within mix networks. As of February 2025, the Nym mixnet remains under active development.
The project continues to be developed in collaboration with research institutions, such as KU Leuven and EPFL. Several other research teams working on privacy-enhancing technologies, cryptography, and decentralized systems have published research articles covering the Nym mixnet design.
Stakeholders
Nym is structured around a mix network architecture, incorporating three primary roles: users, node operators, and validators. The network operates on an incentive-driven economic model designed to maintain its functionality and decentralization.- Users send network traffic through Nym to enhance the privacy of their online activities and communications.
- Node operators manage two types of node roles:
- * Gateways act as entry and exit points to the network. They verify whether a user has access credentials and forward packets either to the inner "mix nodes" or to the internet.
- * Mix nodes, which process traffic by decrypting and mixing packets before forwarding them, ensuring that communication patterns are obfuscated.
- Anyone with technical expertise can download the Nym server software and become an operator, similar to how Tor relays function. A decentralized reward and reputation system is used to monitor operators' with the goal of promoting network stability and efficiency.
- Validators maintain a distributed ledger that stores public information about active nodes and their rewards. They also issue anonymous access credentials using zero-knowledge proofs and digital signatures, allowing users to authenticate without revealing their identity.
- Compensating operators and validators for contributing to network infrastructure, ensuring the network adapts to user demand.
- Maintaining network quality through:
- * A reputation system that prioritizes high-performance operators based on reliability, speed, and latency.
- * Mitigation of Sybil attacks by making it resource-intensive for malicious entities to gain control over a significant portion of the network.
Technical architecture
Access control
Initial access to the network is managed through anonymous access credentials which usage unlinkable from payment and digital signatures. This cryptographic approach enables users to authenticate their access rights to each node without disclosing any identifiable information, thereby enhancing the network's privacy.Network architecture with dynamic reconfiguration
The Nym mixnet consists of a five-layer network architecture, maintained by independent node operators.- Entry gateways: The first layer consists of entry gateways, which serve as access point to the network. Users can select a gateway based on criteria such as reputation, performance, or geographic location.
- Three layers of mix nodes: The core of the mixnet consists of three layers of mix nodes, structured in a stratified architecture. This design is intended to balance privacy protection, network resilience, and efficiency in maintaining inter-node connections.
- Exit gateways: The final layer consists of exit gateways, which forward traffic to the public internet. Users can select an exit gateway similarly to how they choose an entry one.
- A subset of mix nodes is selected to route network traffic, based on a reputation system that evaluates quality of service metrics.
- The selected nodes are then randomly assigned to different layers, reducing the risk of malicious actors strategically positioning themselves within the network to monitor or manipulate traffic.
Privacy-preserving mechanisms
- Uniform packet size: Messages transmitted through the mixnet are divided into fixed-size packets using the "Sphinx" packet format. Standardizing packet sizes helps prevent traffic correlation attacks based on message length.
- Layered encryption: Similar to onion encryption in Tor, each packet is encapsulated in five layers of encryption. As packets traverse the network, each node decrypts only its assigned layer before forwarding the packet. The final node in the sequence is the only one that knows the ultimate destination of the packet.
- Randomized packet transmission: Packets are emitted by the user at random intervals, following a Poisson process.
- Cover traffic injection: Users generate and send dummy packets to accompany real messages. This prevents adversaries from identifying active communication and makes correlation attacks more difficult.
- Temporal reordering at mix nodes: Following the standard mix network model, each mix node introduces random delays and reorders packets before forwarding, rather than forwarding them when they become available. This also aims to disrupt timing correlation between packet input and output, making traffic analysis more challenging.
Cryptographic mechanisms
To initiate communication, the client selects an entry gateway and establishes a secure channel using:
- X25519, an Elliptic Curve Diffie-Hellman key exchange protocol, used for confidential key agreement.
- Ed25519, a digital signature scheme, which ensures the authenticity of the connection.
- Three mix nodes and exit gateway: A four-layer "Sphinx" packet encryption:
- * Packet headers are encrypted using AES-CTR.
- * Packet contents are encrypted using Lioness Wide Block Cipher.
- Entry gateway: The outermost encryption layer is secured using AES-GCM 256-bit for confidentiality and integrity purposes.