From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: ab53d27ea72f35957b04525895f32e9c2de2c7764172a73c267c4c7c326b936a
Message ID: <XcHk5D29w165w@bwalk.dm.com>
Reply To: <859734501.0628582.0@fatmans.demon.co.uk>
UTC Datetime: 1997-04-03 05:32:55 UTC
Raw Date: Wed, 2 Apr 1997 21:32:55 -0800 (PST)
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 2 Apr 1997 21:32:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: remailer spam throttle
In-Reply-To: <859734501.0628582.0@fatmans.demon.co.uk>
Message-ID: <XcHk5D29w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain
I'm a bit behind on my e-mail again...
paul@fatmans.demon.co.uk writes:
> > > > Well, they can compile the list of addresses off of USENET postings and
> > > > such and then compute the hashes of the compiled names and identify
> > > > those that are on the anon acceptance list. Not that it completely
> > > > invalidates the idea, but certainly it is a problem.
> >
> > If a time delay isn`t a problem a remailer could operate on the list
> > with a MAC, if someone wants to find out if a name is on the list
> > they submit a request to the remailer operator who daily executes a
> > batch job using a (memorised) key to verify the hashes against one
> > another.
>
> Another idea I just had.
>
> Alice`s remailer recieves a message for Bob.
>
> The remailer blinds the message with the prime p, sends bob the
> blinded message, a product pq and a random number, x, all the remailer
> keeps is q and x. Bob, to retrieve the message as cleartext sends the
> remailer x and a request in return the remailer sends bob q, bob
> divides pq by q to get p and unblinds the message... Any comments?
This is cute, but if Bob has enough clue to do this, then Bob can
probably handle anonymous e-mail whose content he doesn't like...
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
Return to April 1997
Return to “dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)”
Unknown thread root