'Rifle' TOR Alternative Coming from MIT

Would be cool to cover on the tek.

http://news.mit.edu/2016/stay-anonymous-online-0711

The secret behind Riffle is the use of a mixnet. Mixnet or mix networks are routing protocols that use a chain of proxy servers that take messages from different senders and shuffles them. Then the messages are sent to the destination in a random order. This makes it hard for an eavesdropper to link the source with its receiver.

Good to at least have some more research being done to replace TOR now that the FBI is all over it.

I know MIT is a lot smarter than this, but wouldn't the messages have a sender address and a destination address, so it doesn't really matter what order they get sent, they all have a source and destination header in the packet...unless the source is replaced by each proxy as it goes along. But then there must be some other magic that is helping the client keep the packets organized as well.