From: Jidan <yusuf921@raven.csrv.uidaho.edu>
To: cjl <cjl@welchlink.welch.jhu.edu>
Message Hash: 3d804812def6c1a9ddf491956118b6655fff38037b5e8ef3bc0083fe55a2aefe
Message ID: <Pine.3.87.9408031432.A17383-0100000@raven.csrv.uidaho.edu>
Reply To: <Pine.3.89.9408031548.A5899-0100000@welchlink.welch.jhu.edu>
UTC Datetime: 1994-08-03 21:33:35 UTC
Raw Date: Wed, 3 Aug 94 14:33:35 PDT
From: Jidan <yusuf921@raven.csrv.uidaho.edu>
Date: Wed, 3 Aug 94 14:33:35 PDT
To: cjl <cjl@welchlink.welch.jhu.edu>
Subject: Re: Remailer traffic analysis foiling
In-Reply-To: <Pine.3.89.9408031548.A5899-0100000@welchlink.welch.jhu.edu>
Message-ID: <Pine.3.87.9408031432.A17383-0100000@raven.csrv.uidaho.edu>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, 3 Aug 1994, cjl wrote:
> Remailer hackers,
>
> Would there be any advantage to giving remailers a MIRV capability?
>
> [deleted]
> I guess the issues involved are:
>
[ deleted]
> 2) What is the credible threat of traffic analysis?
> a) Does multiplication of messages and their routing schemes create
> problems of scale for these alleged eavesdropers?
> b) Do you assume that if it's not a compromised server, that
> what goes on inside the machine is hidden?
>
for total anon post/mail
How workable is setting up remailers with psudo-cooperation
so that when it recieves an anon mail it waits 20 or so min
and then randomly sends copies of it to 5 other remailers of which
the original reciever randomly decides which 1 of the 6 will post
and the rest simply discard.
a 5 fold increase in traffic will make it harder to analize if
80% is just noise
Duct tape is like the force. It has a light side, and a dark side, and
it holds the universe together ...
-- Carl Zwanzig
Return to August 1994
Return to “Jidan <yusuf921@raven.csrv.uidaho.edu>”