1995-02-03 - A simple idea

Header Data

From: Jon Lasser <jlasser@rwd.goucher.edu>
To: cypherpunks@toad.com
Message Hash: a9e8fe28f5d01a9f339a8c1ca65574cca1f99d517057ea539b59dec1ee600163
Message ID: <Pine.SUN.3.91.950203012421.8112A-100000@rwd.goucher.edu>
Reply To: N/A
UTC Datetime: 1995-02-03 06:31:34 UTC
Raw Date: Thu, 2 Feb 95 22:31:34 PST

Raw message

From: Jon Lasser <jlasser@rwd.goucher.edu>
Date: Thu, 2 Feb 95 22:31:34 PST
To: cypherpunks@toad.com
Subject: A simple idea
Message-ID: <Pine.SUN.3.91.950203012421.8112A-100000@rwd.goucher.edu>
MIME-Version: 1.0
Content-Type: text/plain



Maybe this has been discussed before, but if so I wasn't around for it 
and would like to know:

What if: (assuming trusted remailers, but still worried about traffic 
analysis of those remailers):

One mailed a message to one remailer. This remailer held onto all 
messages until some predestined hour or kilobyte size or whatever, and 
then forwarded ALL its messages to this other remailer, in one packet 
(.TARred and PGPed separately, say), but NOT IN THE ORDER RECIEVED?

While this wouldn't solve all the problems (to some extent, the sizes of 
files might be correlated, but this could probably be foiled by other 
means), wouldn't it at least foil the easy to/from traffic analysis that 
is (I believe) the greatest threat?

Jon
==============================================================================
                     Jon Lasser <jlasser@goucher.edu>
This is an advanced .signature virus -- please attach to your .signature and
add your last initial to the list: l
------------------------------------------------------------------------------






Thread