1996-09-03 - Re: SRP (from the cutting-room floor)

Header Data

From: qut@netcom.com (Dave Harman OBC)
To: N/A
Message Hash: caf4739a4e39d9da05c100b83f3f78da1a9a6f3a48c1e7dbac8f6ae199624ea3
Message ID: <199609031909.MAA20276@netcom.netcom.com>
Reply To: <9609031622.AA26229@clare.risley.aeat.co.uk>
UTC Datetime: 1996-09-03 23:32:31 UTC
Raw Date: Wed, 4 Sep 1996 07:32:31 +0800

Raw message

From: qut@netcom.com (Dave Harman OBC)
Date: Wed, 4 Sep 1996 07:32:31 +0800
Subject: Re: SRP (from the cutting-room floor)
In-Reply-To: <9609031622.AA26229@clare.risley.aeat.co.uk>
Message-ID: <199609031909.MAA20276@netcom.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


This sounds simple to implement by users and remailers,  after all,
cpunk messages with bad syntax -> /dev/null .

Users can implement this quite easily, simply use the cpunk 
more than you actually need to.  You are your best decoy.

I muse about the idea of remailers that freely allow anybody to
access the ques of the cpunk remailers with http and telnet.
If people are using the remailers properly, and the destination is
usenet, there's no loss to privacy.  This can even be implemented
with e-mail destinations, with no loss to privacy that isn't already 
lost simply by using the net itself.  Should this idea be 
implemented with the cpunk remailers, it can actually prevent the
seizure of the server by the authorities, considering how they
couldn't get anything they couldn't have already gotten by simply
telneting or httping in.  There is the reported risk of the timing
cryptanalysis attacks, so a que of messages can be made inaccessable
while the actual {en|de}cryption is being done. 

I plan on doing these things when I can get the Linux/BSD system
more figured out than I have.  I'm primarily intersted in learning,
so I plan on keeping an open system, other than the Mixmaster
binaries and other stuff affected by ITAR.





Thread