From: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
To: cypherpunks@toad.com
Message Hash: 806ada22324c61740b9a7edf26a94eb4a287f021876ef2b874ecf5d1f1da4237
Message ID: <9308092014.AA21402@anchor.ho.att.com>
Reply To: N/A
UTC Datetime: 1993-08-09 21:06:39 UTC
Raw Date: Mon, 9 Aug 93 14:06:39 PDT
From: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
Date: Mon, 9 Aug 93 14:06:39 PDT
To: cypherpunks@toad.com
Subject: Re: ANON: Re: how does it work
Message-ID: <9308092014.AA21402@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text
> Phil Karn says:
> > You don't use the system telnet, you write your own socket application.
...
> > You could hack up a copy of sendmail, but SMTP is so trivial that you
> > could do it yourself, especially since the functionality you need
> > is so limited.
Perry says:
> Indeed, writing an SMTP agent in Perl is quite trivial -- I've done it.
While you're at it, another source for traffic analysis is DNS requests;
you may want to cache these for the sites you commonly connect to,
or at least put a DNS server on your machine to do some caching.
In a mature environment, most of your anonymous traffic will go to
other remailers anyway, but might as well cut down on the logging opportunities.
Bill
Return to August 1993
Return to “wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)”
1993-08-09 (Mon, 9 Aug 93 14:06:39 PDT) - Re: ANON: Re: how does it work - wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)