1996-01-03 - Foiling Traffic Analysis

Header Data

From: tcmay@got.net (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: b0417283316e01d0790876c81552c622b5873fe4792cb313cbcdcfe9c50f23ac
Message ID: <ad0ebb9d0c0210048ac9@[205.199.118.202]>
Reply To: N/A
UTC Datetime: 1996-01-03 19:07:17 UTC
Raw Date: Thu, 4 Jan 1996 03:07:17 +0800

Raw message

From: tcmay@got.net (Timothy C. May)
Date: Thu, 4 Jan 1996 03:07:17 +0800
To: cypherpunks@toad.com
Subject: Foiling Traffic Analysis
Message-ID: <ad0ebb9d0c0210048ac9@[205.199.118.202]>
MIME-Version: 1.0
Content-Type: text/plain


At 4:35 AM 1/2/96, Jon Lasser wrote:

>The potential for traffic analysis is the danger here. If an "FBI
>International Data Laundering Expert" testifies in court that said data
>came from a site known to be frequented solely by so-and-sos, all the
>strong crypto in the world won't stop the average jury from convicting you.
>
>Carl Ellison (among others, I'm sure) has suggested various means of
>foiling traffic analysis among a group of trusted conspirators, using a
>token-ring-like routing scheme. I'm not completely convinced that it's
>robust enough, but a variation on it is probably adaptable.

How does this differ from Dining Cryptographers approaches?


--Tim May

We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1  | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









Thread