From: Jeffrey A Nimmo <janimmo@ionet.net>
To: Hal <hfinney@shell.portal.com>
Message Hash: 6c6bb289ed2dd2edcf29d19484f43d2c0ecac39950d8999c86d28a05a7e90bbc
Message ID: <Pine.SOL.3.91.960629165335.10952B-100000@ion1.ionet.net>
Reply To: <199606291634.JAA28291@jobe.shell.portal.com>
UTC Datetime: 1996-06-30 01:49:13 UTC
Raw Date: Sun, 30 Jun 1996 09:49:13 +0800
From: Jeffrey A Nimmo <janimmo@ionet.net>
Date: Sun, 30 Jun 1996 09:49:13 +0800
To: Hal <hfinney@shell.portal.com>
Subject: Re: anonymous mailing lists
In-Reply-To: <199606291634.JAA28291@jobe.shell.portal.com>
Message-ID: <Pine.SOL.3.91.960629165335.10952B-100000@ion1.ionet.net>
MIME-Version: 1.0
Content-Type: text/plain
On Sat, 29 Jun 1996, Hal wrote:
> Since the PGP is run on private computers, and only at mail-reading time,
> there should be no problem entering the conventional encryption
> passphrase and checking to see whether the messages decrypt. Actually
> PGP puts a pattern at the beginning of the encrypted portion, so
> successful decryption can be checked very quickly, without much of a
> computational load.
OK, so now I'm downloading twenty times as much anonymous mail (the original
scenario called for a 20:1 increase). Suppose for a minute that I'm doing
something really silly, like subscribing to cypherpunks through a nym (as
some do). Now, instead of an average of sixty messages a day, I'm getting
twelve hundred. I think my ISP might have something to say about that.
Also, who on earth would be willing to even double the load on his server
in order to enact this? I doubt that Mr. Parekh or anyone else would do it.
Can anyone do the math as to what the quotient would have to be in order to
defy traffic analysis? It seems to me that even twenty to one would fool
a determined attacker only for a while. After all, we're not talking
about a very large pool. Presumably only those individuals who had a nym
on a particular server would be chosen for this mail blind.
Return to June 1996
Return to “Jeffrey A Nimmo <janimmo@ionet.net>”