From: Jeremiah A Blatz <jer+@andrew.cmu.edu>
To: cypherpunks-unedited@toad.com
Message Hash: 74ca7f825ada99b09912ba4a82981dd3980d15c61e6457493ee1f306f5cc9380
Message ID: <199702080810.AAA13064@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-08 08:10:48 UTC
Raw Date: Sat, 8 Feb 1997 00:10:48 -0800 (PST)
From: Jeremiah A Blatz <jer+@andrew.cmu.edu>
Date: Sat, 8 Feb 1997 00:10:48 -0800 (PST)
To: cypherpunks-unedited@toad.com
Subject: Re: anonymous remailers
Message-ID: <199702080810.AAA13064@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com> writes:
> Charley Musselman writes:
> > Does anyone know the answer? Specifically, how can we choose
> > a trusted remailer?
>
> The answer is to run your own remailer. Make sure your chain includes your
> remailer at least once. If you can't trust yourself, who can you trust?
Ummm, if you run your own remailer, and don't get lots of people to
use it, then traffic analysis will reveal that you are the sender
quite quickly. It will pretty much make everything in the chain before
your remiler useless. If you send your message through remailers a, b,
c, and d like this:
you -> a -> b -> c -> d -> alt.drugs.and-other-various-horsemen
and only you use c, then your effective chain is:
someone who could only be you -> d -> alt.drugs.and-other-various-horsemen
This chain is weak indeed.
Jer
"standing on top of the world/ never knew how you never could/ never knew
why you never could live/ innocent life that everyone did" -Wormhole
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQB1AwUBMvwyI8kz/YzIV3P5AQE6JgL/RJ9Y3GmZl2mQ0dK9tVtaZG7OW33xKHqV
Ur9fQt3Yms19bCbq+bAWoeNC5ZPjXESCtGigPW3VmXVjCd4igPepk25dtzR1OcL+
In/0n9QcRqDvmupZFFdldY62orGQyVEm
=JIWK
-----END PGP SIGNATURE-----
Return to February 1997
Return to ““Mark M.” <markm@voicenet.com>”