From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: b66303f74f5402326fe90bb532e208d6fb02e0c83fc90bdd20de8cd00c97aea8
Message ID: <9303291727.AA21227@soda.berkeley.edu>
Reply To: <9303290017.AA05745@toad.com>
UTC Datetime: 1993-03-29 14:47:27 UTC
Raw Date: Mon, 29 Mar 93 06:47:27 PST
From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Mon, 29 Mar 93 06:47:27 PST
To: cypherpunks@toad.com
Subject: a blackmail opportunity
In-Reply-To: <9303290017.AA05745@toad.com>
Message-ID: <9303291727.AA21227@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
Eli Brandt writes:
>An unscrupulous person running a
>remailer can obviously keep records of truenames, along with
>messages that their senders do not want associated with them.
>Always encrypting helps with mail, but not with news.
If you don't trust your remailer operator, use more than one. This is
the whole point of multiple chainings. A single point failure can be
any number of different threats: blackmail, coerced disclosure by
threat of violence, compromised equipment. All of these can be
defended against by making a system proof against single point
failure.
For posting to news, one should always use two hops. The first
destroys any the identity of the poster and the second one decrypts it
for transmission. Both hops are encrypted, but the second relay sees
the plaintext and cannot link it to anyone because the first relay is
anonymous.
Eric
Return to March 1993
Return to “Eric Hughes <hughes@soda.berkeley.edu>”