1993-01-21 - Re: Communications Policy (fwd)

Header Data

From: tcmay@netcom.com (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: d381a61331a5dbe22aa264b241293d4dcbac1a7d7406f13b106cddf17f4610cc
Message ID: <9301211755.AA27771@netcom3.netcom.com>
Reply To: N/A
UTC Datetime: 1993-01-21 17:58:24 UTC
Raw Date: Thu, 21 Jan 93 09:58:24 PST

Raw message

From: tcmay@netcom.com (Timothy C. May)
Date: Thu, 21 Jan 93 09:58:24 PST
To: cypherpunks@toad.com
Subject: Re: Communications Policy (fwd)
Message-ID: <9301211755.AA27771@netcom3.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


After sending the attached message to Johan Helsingius, I decided it
might be of general interest to the Cypherpunks list. It's a message I
sent out in December, originally, and which got debated.

Johan's concern about my "accusations" suggests there may be enought
newcomers to the list to justify republication of posts. 

--Tim

From: tcmay (Timothy C. May)
Subject: Re: Communications Policy
To: julf@penet.FI (Johan Helsingius)
Date: Thu, 21 Jan 93 9:49:00 PST


> > e-mail system kept by sysadmins. Sort of like the archives being kept
> > by some of the so-called anonymous remailers!)
> 
> Hmmmm.... I find the accusation about anonymous remailers pretty strong.
> If you have proof of stuff like that happening, or even reasonable cause
> for suspicions, I feel the accusations and names of the sites should be
> published as widely as possible. That is the only way we can stop
> such unethical behavior.

Johan,

Attached below is the message I sent to the Cypherpunks list in
December, about remailers keeping logs. As I said in my message today
to the list, there was a debate about this, and an admission by
several remailers that they keep archives.



From: tcmay@netcom.com (Timothy C. May)
Message-Id: <9212140649.AA12228@netcom.netcom.com>
Subject: A minor experimental result
To: cypherpunks@toad.com
Date: Sun, 13 Dec 92 22:49:45 PST


One of the purposes of setting up remailers is to experiment with
them, see what kind of emergent behavior appears, see what kind of
flaws and obstacles arise, see how they break, etc.

Here's one: the compromise of my "anonymity" by one of the folks
running a remailer. (Who and where don't matter, just the phenomenon
itself.)

I used a single bounce without any encryption to send a message and
got a query from the owner of the remailer saying "I couldn't help
looking through my remailer archives and noticing...." and requesting
more information from me!!

Hoist by my own petard!

Several lessons:

* Multiple bounces help, even without encryption, as then the remailer
sysop can't be sure who originated the message.

* Encryption is of course even more desirable, though a hassle
(especially for Mac users).

* Remailer sysops should make a point to _not_ look at their remailer
archives. In fact, they should discard them immediately (for their own
legal protection, and for slightly greater trust amongst users, though
this is a hazy area...).

(Recall that the "mix" on which our software-based remailers are
loosely patterned are "memoryless," i.e., the tamper-resistant modules
that implement the receive-decrypt-store-forward protocol have no
memory of the mapping between incoming and outgoing messages. In
fact, the outside world cannot possibly compromise the protocols to get
at this information.)  

So, my laziness in using only a single bounce, combined with the
curiosity of a remailer sysop, breaks the anonymity.

Neither surprising nor profound, but I thought you folks would like to know.


--Tim May

--
..........................................................................
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
408-688-5409 | knowledge, reputations, information markets,
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
Higher Power: 2^756839 | PGP Public Key: by arrangement.






Thread