1994-04-14 - Re: fake pgp messages

Header Data

From: cort <cort@ecn.purdue.edu>
To: cypherpunks@toad.com
Message Hash: 479dfb70a5943104fdca0a7852139fd28929bdd3a803b7f444f80e24a9004c00
Message ID: <199404141436.JAA05814@en.ecn.purdue.edu>
Reply To: N/A
UTC Datetime: 1994-04-14 14:36:34 UTC
Raw Date: Thu, 14 Apr 94 07:36:34 PDT

Raw message

From: cort <cort@ecn.purdue.edu>
Date: Thu, 14 Apr 94 07:36:34 PDT
To: cypherpunks@toad.com
Subject: Re: fake pgp messages
Message-ID: <199404141436.JAA05814@en.ecn.purdue.edu>
MIME-Version: 1.0
Content-Type: text

> > in the process of doing stuff to fight traffic analysis, i need to generate
> > a bunch of fake pgp messages.  it is possible to asciiarmor random
> > bits, but this is pretty easy to spot.  does anyone know a good
> > way to generate a large amount of bogus pgp messages?
> What better way than to generate real pgp messages that encrypt noise files?
> Just generate pseudorandom binary data of pseudorandom length (biased 
> toward the length of real messages), and encrypt with pgp, using the 
> public key of some person's key from a public server, selected at 
> random.  If you want to be able to spend less cpu time, you could hack a 
> copy of pgp to simulate doing this, of course, using the symmetric key 
> cipher (idea) in a stream cipher mode.

Better "noise" might be _real_ words, paragraphs, etc.

It occurred to me once that some of the remailer operators could
bounce the cypherpunks mailing list around through their remailers
to get more traffic/noise.