1993-08-09 - Re: ANON: Re: how does it work

Header Data

From: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
To: cypherpunks@toad.com
Message Hash: 806ada22324c61740b9a7edf26a94eb4a287f021876ef2b874ecf5d1f1da4237
Message ID: <9308092014.AA21402@anchor.ho.att.com>
Reply To: N/A
UTC Datetime: 1993-08-09 21:06:39 UTC
Raw Date: Mon, 9 Aug 93 14:06:39 PDT

Raw message

From: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
Date: Mon, 9 Aug 93 14:06:39 PDT
To: cypherpunks@toad.com
Subject: Re: ANON: Re: how does it work
Message-ID: <9308092014.AA21402@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text


> Phil Karn says:
> > You don't use the system telnet, you write your own socket application.
...
> > You could hack up a copy of sendmail, but SMTP is so trivial that you
> > could do it yourself, especially since the functionality you need
> > is so limited.
Perry says:
> Indeed, writing an SMTP agent in Perl is quite trivial -- I've done it.

While you're at it, another source for traffic analysis is DNS requests;
you may want to cache these for the sites you commonly connect to,
or at least put a DNS server on your machine to do some caching.
In a mature environment, most of your anonymous traffic will go to
other remailers anyway, but might as well cut down on the logging opportunities.
		Bill





Thread