1997-08-18 - Re: Remailer hating Nazis

Header Data

From: nobody@REPLAY.COM (Anonymous)
To: cypherpunks@toad.com
Message Hash: f0cadd0702b4e45cb1619492f39dbfcf006aee11b99c04d3acdf943af4c4998f
Message ID: <199708180834.KAA03366@basement.replay.com>
Reply To: N/A
UTC Datetime: 1997-08-18 08:51:19 UTC
Raw Date: Mon, 18 Aug 1997 16:51:19 +0800

Raw message

From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 18 Aug 1997 16:51:19 +0800
To: cypherpunks@toad.com
Subject: Re: Remailer hating Nazis
Message-ID: <199708180834.KAA03366@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Anonymous wrote:
> There are lots of good reasons to use remailers, but thinking that you are
> not responsible for your actions is not one of them.  Anything you send
> may be around to haunt you for many years to come.

> If you believe that any computer sytem is foolproof... you have a lot to
> learn.  There is always a possibility that people will found out your real
> identity and where you live, through a human error or a flaw in the
> remailer.  (Right, toto?).

  Right, small, warm-blooded creature.
 
  There are a plethora of available avenues for surruptitious agents to
exploit InterNet technology and methodology in order to reveal both your
identity and the content of your communications.
  To truly achieve anonymity and privacy, one should be prepared to use
the strictest standards of paranoia, the full capabilities of privacy
and anonymity tools, and personal methodologies aimed at thwarting
unlikely and/or impossible surveillance techniques as well as the
currently known methods.

  Beyond the mere technology itself, one must consider the possibile
use of psychological manipulation of individuals and groups into a
specific mindset that, combined with an analysis of the individual's
natural psychological profile, can enable a surreptitious entity to
move the individual toward patterns or processes which will make
the technological tools of identity and information analysis more
effective.

 For example, take the fictitious case wherein an individual is prone
to using only two different remailers, say, for instance, the remailer
at c2net and the remailer at dhp.com.
 Suppose that the remailer at c2net was being monitored surreptitiously
by an agent who had access to their system, but either had no way to 
access messages encrypted to the remailer, or their efforts to monitor 
the remailer seemed to be thwarted at times by another, unknown entity
with access to the system.
  The surreptitious agent could arrange to have the c2net remailer shut
down under some pretext, and seed the monitored individual's private
email, mailing lists, and newsgroups with subtle pointers/suggestions
as to the reliability/security, etc., of another remailer which was
more securely under the agent's control, say, for instance, a remailer
at replay.com.
  After the monitored individual has begun using the remailer at
replay.com, then the agent would proceed to do the same thing in regard
to the remailer at dhp.com, and another remailer controlled by the
agent or associates of the agent, say, for instance the remailer at
cypherpunks.ca.

  The agent is now in a postion to have the majority of the monitored
individual's communications vulnerable to identity, information and
traffic analysis, and thus will have an enormous amount of information
to work with should the individual occasionally spread their anonymous
communications through remailers that the agent may have less complete
access to.
  If we suppose that the agent also is able to manipulate the monitored
individual into sending the agent email that is encrypted to several
recipients, including the agent or the agent's associates, then we see
that the agent now has an even broader database of known information
which can be analyzed to provide clues as to the identity of and the
information sent by others who communicate with the individual who is
being monitored.

  This fictitious example, if it came to pass, would serve to provide
information to the agent which could be used to more effeciently 
target those who would be subjected to more restricted forms of
surveillance, such as monitoring of the physical signals given off
by their computer, keyboard, and monitor.
  All in all, the small, warm-blooded creature is correct in implying
that one should always keep a shotgun by their computer, in the firm
knowledge that the dogs of war do not always bark to announce their
omnipresence.

> Greets to all my friends in domestic surveilance.

  And greets to all of my friends who are watching your friends.

Anonymous ReMonger






Thread