1997-03-03 - Military Snooping

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: be334226f0c2b3f52a9065369637f4bb33010ec3aba9a7547a58b65e70c9beb9
Message ID: <1.5.4.32.19970303193819.00700ac8@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-03-03 19:45:07 UTC
Raw Date: Mon, 3 Mar 1997 11:45:07 -0800 (PST)

Raw message

From: John Young <jya@pipeline.com>
Date: Mon, 3 Mar 1997 11:45:07 -0800 (PST)
To: cypherpunks@toad.com
Subject: Military Snooping
Message-ID: <1.5.4.32.19970303193819.00700ac8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Lucky Green posted the message below elsewhere which 
raises provocative questions about military snooping on 
the Net to combat anonymizers and remailers:

[Forward]

At the FC'97 rump session, Paul Syverson from NRL presented 
a paper titled "Onion Routing". The description of the system 
sounds very much like Wei Dai's PipeNet. However, the 
development team seems to be unaware of PipeNet
and the discussions about it that we had in the past.

NLR has currently five machines implementing the protocol. 
Connection setup time is claimed to be 500 ms. They are looking 
for volunteers to run "Onion Routers". It appears the US military 
wants to access websites without giving away the fact that they 
are accessing the sites and is looking to us to provide the cover 
traffic. What a fortunate situation.

They said that the source would soon be on the web page, but so 
far it has not appeared.

http://www.itd.nrl.navy.mil/ITD/5540/projects/onion-routing/

[End forward]

For those who don't want NRL snooping on their accesses, we've 
put three of the Onion-Routing papers at:

   http://jya.com/onion.htm

   http://jya.com/privnet.htm

   http://jya.com/hri.htm  (a conversion from PDF)







Thread