From: shamrock@netcom.com (Lucky Green)
To: Jon Lasser <tcmay@got.net>
Message Hash: 80e12be912ff696de54211b28cd924d2e3268179c0ca0e06aace91d895ab19a2
Message ID: <v02120d01ad0fa95f21ee@[192.0.2.1]>
Reply To: N/A
UTC Datetime: 1996-01-03 03:59:17 UTC
Raw Date: Wed, 3 Jan 1996 11:59:17 +0800
From: shamrock@netcom.com (Lucky Green)
Date: Wed, 3 Jan 1996 11:59:17 +0800
To: Jon Lasser <tcmay@got.net>
Subject: Re: Foiling Traffic Analysis
Message-ID: <v02120d01ad0fa95f21ee@[192.0.2.1]>
MIME-Version: 1.0
Content-Type: text/plain
At 20:02 1/2/96, Jon Lasser wrote:
>When the group of packets arrives at a given station, it replaces its
>current encrypted packet with a new packet; if it doesn't have any new
>packets to send, it puts up a garbage packet that is indistinguishable
>from a normal packet. It then scans all the other packets and attempts to
>decrypt them with its private key. Any it can read, it does; all the
>packets are forwarded to the next station in the ring.
All participants in this network are clearly guilty of conspiracy. Their
assets will be confiscated under RICO. As Brian mentioned, the law
enforcement agencies are creating a surplus by such seizures. The costs
associated with more prosecutions are more than offset by the revenue
generated. Your computer will make a welcome addition to their budget.
-- Lucky Green <mailto:shamrock@netcom.com>
PGP encrypted mail preferred.
Return to January 1996
Return to “shamrock@netcom.com (Lucky Green)”
1996-01-03 (Wed, 3 Jan 1996 11:59:17 +0800) - Re: Foiling Traffic Analysis - shamrock@netcom.com (Lucky Green)