1995-07-24 - Re: An idea about Java and remailer clients and servers…

Header Data

From: Ray Cromwell <rjc@clark.net>
To: cypherpunks@toad.com
Message Hash: c5568b1f1f8999d751b1c624cbf72acf90ed4c478e5721765d813a004cec2b31
Message ID: <199507242355.TAA26223@clark.net>
Reply To: <199507242313.BAA27191@utopia.hacktic.nl>
UTC Datetime: 1995-07-24 23:55:30 UTC
Raw Date: Mon, 24 Jul 95 16:55:30 PDT

Raw message

From: Ray Cromwell <rjc@clark.net>
Date: Mon, 24 Jul 95 16:55:30 PDT
To: cypherpunks@toad.com
Subject: Re: An idea about Java and remailer clients and servers...
In-Reply-To: <199507242313.BAA27191@utopia.hacktic.nl>
Message-ID: <199507242355.TAA26223@clark.net>
MIME-Version: 1.0
Content-Type: text/plain


> 
> Phil Fraering writes:
> >  Why not "charge" for the ability to send an anonymous message with
> >  the duty to have for a short time (maybe an hour or two) running
> >  on your machine a node in a remailer network?
> 
> User X on Machine A sends a form via HTTP (or a variant- SHTTP, HTTPS, etc.)
> to Machine B.  User Y on Machine C receives an anonymous mail from Machine
> B.  Suspecting User X, User Y sends a mail to be anonymized and sent back to
> himself to User X.  User X's temporary remailer does as it's told.  User Y

 I forgot to add. There is no reason User X has to run his remailer
immediately. His software could simply commit to running a remailer for
1 hour at some specified future date < some threshold. Any messages
sent to him for remailing would be queued until that time. Therefore,
all your technique would tell you is that the user remailed a message
sometime between date X and date Y. if Y-X > few days to week or two,
the intelligence gathered on User X is miniscule. Traffic analysis would
detect User X using the remailer network anyway.

-Ray








Thread