1997-05-14 - FW: Anonymous Remailers

Header Data

From: “Roger J. Jones” <cyber@ibpinc.com>
To: “‘cypherpunks@toad.com>
Message Hash: 7f8048fa7e83a68bc19ab822419cb500cf110a7a7c60126bd0a1f3af2649f064
Message ID: <01BC6065.17582FB0@pc1901.ibpinc.com>
Reply To: N/A
UTC Datetime: 1997-05-14 18:06:09 UTC
Raw Date: Thu, 15 May 1997 02:06:09 +0800

Raw message

From: "Roger J. Jones" <cyber@ibpinc.com>
Date: Thu, 15 May 1997 02:06:09 +0800
To: "'cypherpunks@toad.com>
Subject: FW: Anonymous Remailers
Message-ID: <01BC6065.17582FB0@pc1901.ibpinc.com>
MIME-Version: 1.0
Content-Type: text/plain

-----Original Message-----
From:	Tim May [SMTP:tcmay@got.net]
Sent:	Wednesday, May 14, 1997 11:52 AM
To:	Roger J. Jones; 'cypherpunks@toad.com'
Subject:	Re: Anonymous Remailers

At 5:17 AM -0800 5/14/97, Roger J. Jones wrote:
>Why is it that some who are very concerned about their personal privacy
>utilize anonymous remailers that:
>1) Log all of their mail messages?

With chained, multiply-encrypted messages, logs are ineffective unless all of the links in the chain collude to trace messages. While this is certainly possible, it seems unlikely.

>2) Are in many cases reputed to be run by foreign intelligence services?

This allegation was made by some clueless Washington think tank authors.  They provided no evidence, only innuendo, and they were unwilling or unable to provide any further comments when queried by several Cypherpunks.
I suggest that just because you chose to characterize the sources as "clueless Washington think tank authors" does not (as they say in Star Trek - The Next Generation) "make it so".  The "allegation" that foreign governments actively participate in actions to violate personal privacy ("borrowing" laptops from traveling businesspeople, taping phones, etc.) are all documented in various places.  Of course, they could all the result of a single psyop with excellent results.  But I doubt it.
And given that many or even most of the remailer operators are members of the various related Cypherpunks or Remailers Operators lists, and are known to various of us, the notion that most (or even many) remailers are run by intelligence agencies is absurd.

>Do they really trust the owner of the remailer? (Unless of course, it is
>their remailer?)  I seem to be missing something.

I don't recognize your name on this list. Fine, as we always like to see new subscribers. But I surmise you just haven't spent enough time yet reading and thinking about these issues.
You may surmise what you choose.  In fact, that is the essence of free discourse.  Of course, knowing is far better than surmising.  If you care to suggest a reading list please feel free to mail it to me direct.  And yes, I am new to this most charming and entertaining list.  Thank you for the welcome
Welcome to the Cypherpunks list.
* Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
Timothy C. May              | Crypto Anarchy: encryption, digital money, tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets, Higher Power: 2^1398269     | black markets, collapse of governments.  "National borders aren't even speed bumps on the information superhighway."