From: cort <cort@ecn.purdue.edu>
To: cypherpunks@toad.com
Message Hash: 479dfb70a5943104fdca0a7852139fd28929bdd3a803b7f444f80e24a9004c00
Message ID: <199404141436.JAA05814@en.ecn.purdue.edu>
Reply To: N/A
UTC Datetime: 1994-04-14 14:36:34 UTC
Raw Date: Thu, 14 Apr 94 07:36:34 PDT
From: cort <cort@ecn.purdue.edu>
Date: Thu, 14 Apr 94 07:36:34 PDT
To: cypherpunks@toad.com
Subject: Re: fake pgp messages
Message-ID: <199404141436.JAA05814@en.ecn.purdue.edu>
MIME-Version: 1.0
Content-Type: text
> > in the process of doing stuff to fight traffic analysis, i need to generate
> > a bunch of fake pgp messages. it is possible to asciiarmor random
> > bits, but this is pretty easy to spot. does anyone know a good
> > way to generate a large amount of bogus pgp messages?
>
> What better way than to generate real pgp messages that encrypt noise files?
> Just generate pseudorandom binary data of pseudorandom length (biased
> toward the length of real messages), and encrypt with pgp, using the
> public key of some person's key from a public server, selected at
> random. If you want to be able to spend less cpu time, you could hack a
> copy of pgp to simulate doing this, of course, using the symmetric key
> cipher (idea) in a stream cipher mode.
>
Better "noise" might be _real_ words, paragraphs, etc.
It occurred to me once that some of the remailer operators could
bounce the cypherpunks mailing list around through their remailers
to get more traffic/noise.
Cort.
Return to April 1994
Return to “cort <cort@ecn.purdue.edu>”
1994-04-14 (Thu, 14 Apr 94 07:36:34 PDT) - Re: fake pgp messages - cort <cort@ecn.purdue.edu>