From: Jon Lasser <jlasser@rwd.goucher.edu>
To: cypherpunks@toad.com
Message Hash: a9e8fe28f5d01a9f339a8c1ca65574cca1f99d517057ea539b59dec1ee600163
Message ID: <Pine.SUN.3.91.950203012421.8112A-100000@rwd.goucher.edu>
Reply To: N/A
UTC Datetime: 1995-02-03 06:31:34 UTC
Raw Date: Thu, 2 Feb 95 22:31:34 PST
From: Jon Lasser <jlasser@rwd.goucher.edu>
Date: Thu, 2 Feb 95 22:31:34 PST
To: cypherpunks@toad.com
Subject: A simple idea
Message-ID: <Pine.SUN.3.91.950203012421.8112A-100000@rwd.goucher.edu>
MIME-Version: 1.0
Content-Type: text/plain
Maybe this has been discussed before, but if so I wasn't around for it
and would like to know:
What if: (assuming trusted remailers, but still worried about traffic
analysis of those remailers):
One mailed a message to one remailer. This remailer held onto all
messages until some predestined hour or kilobyte size or whatever, and
then forwarded ALL its messages to this other remailer, in one packet
(.TARred and PGPed separately, say), but NOT IN THE ORDER RECIEVED?
While this wouldn't solve all the problems (to some extent, the sizes of
files might be correlated, but this could probably be foiled by other
means), wouldn't it at least foil the easy to/from traffic analysis that
is (I believe) the greatest threat?
Jon
==============================================================================
Jon Lasser <jlasser@goucher.edu>
This is an advanced .signature virus -- please attach to your .signature and
add your last initial to the list: l
------------------------------------------------------------------------------
Return to February 1995
Return to “Jon Lasser <jlasser@rwd.goucher.edu>”
1995-02-03 (Thu, 2 Feb 95 22:31:34 PST) - A simple idea - Jon Lasser <jlasser@rwd.goucher.edu>