1996-06-30 - Re: anonymous mailing lists

Header Data

From: Alex de Joode <usura@replay.com>
To: cypherpunks@toad.com
Message Hash: d6cc7a79cddb83fb2565bd8daba4b76174097cd3f9a1b252e6d039bcc11fc5b2
Message ID: <199606300249.EAA26246@basement.replay.com>
Reply To: N/A
UTC Datetime: 1996-06-30 06:58:26 UTC
Raw Date: Sun, 30 Jun 1996 14:58:26 +0800

Raw message

From: Alex de Joode <usura@replay.com>
Date: Sun, 30 Jun 1996 14:58:26 +0800
To: cypherpunks@toad.com
Subject: Re: anonymous mailing lists
Message-ID: <199606300249.EAA26246@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


Hal sez:
: Wei Dai did some nice statistical analysis of this type of attack
: sometime a year or two ago.  Even with countermeasures such as you
: suggest, if they are not perfect, so some information leaks correlating
: incoming and outgoing messages, Wei showed that it was possible to
: deduce the owners of the nyms surprisingly quickly.

: The countermeasures do work - if you get and send exactly 50 pieces of
: 4K byte email every day, no matter what, then correlations don't exist
: - but they are expensive to do perfectly.  For now we have much worse
: weaknesses; none of the current return-address systems are really safe,
: other than posting encrypted mail to newsgroups (and even that may be a
: problem if they suspect who you are and are monitoring your computer
: link to see if you download certain messages).

Use ssh or any other link encryptor, or fetch the whole newsgroup using
uucp.

--

	-AJ-





Thread