From: andrew_derry@sfu.ca
To: cypherpunks@toad.com
Message Hash: aee3d5e99ab0452f6a820003a8cf9b69e2d77c0d1ba8111de502d9bc184c289f
Message ID: <9212142148.AA13622@whistler.sfu.ca>
Reply To: N/A
UTC Datetime: 1992-12-14 21:48:53 UTC
Raw Date: Mon, 14 Dec 92 13:48:53 PST
From: andrew_derry@sfu.ca
Date: Mon, 14 Dec 92 13:48:53 PST
To: cypherpunks@toad.com
Subject: Re: A minor experimental result
Message-ID: <9212142148.AA13622@whistler.sfu.ca>
MIME-Version: 1.0
Content-Type: text/plain
> If I wanted to be obnoxious, I could set myself up as a remailer,
>then screen all incoming messages to see whether they came from other
>known remailers. If not, then I can archive the message, have a look at
>it, and maybe compromise the original sender.
>
> Is this so?
Seems quite possible to me.. I think that's why it was suggested a while
back that as many remailers be set up as possible. That way, one could use
several in a row and virtually eliminate the problem.
> In this case, everyone wanting to use a remailer should in principle
>*own* a remailer, and you'd probably want your own to be the first
>remailer. Then, to avoid compromise of the recipient, maybe you'd want
>yours to be the last remailer. So why not use your own remailer
>exclusively?
I don't think you'd have to worry much about compromising the recipient, if
you encrypt the message with with her public key (except possibly traffic
analysis, which I doubt poses a problem to very many people, and which can
be overcome anyways).
> To take this to an extreme, set up a remailer and then use this
>*all* the time for the mail you originate. Does this gain you anything?
Well, it would probably be ok if a lot of other people used your remailer..
but if you were the only one, I doubt it would be very effective.
---
Andrew Derry - derry@sfu.ca |
ACS@HCC - Simon Fraser University |
Standard disclaimers apply |
Return to December 1992
Return to “andrew_derry@sfu.ca”
1992-12-14 (Mon, 14 Dec 92 13:48:53 PST) - Re: A minor experimental result - andrew_derry@sfu.ca