From: tzeruch@ceddec.com
To: cypherpunks@algebra.com
Message Hash: 88c383ac2308dee235cc4a6ae835f9a00315c2d42badfd86505c4fc78bee1543
Message ID: <97May15.112158edt.32257-1@brickwall.ceddec.com>
Reply To: <01BC603F.4B529240@pc1901.ibpinc.com>
UTC Datetime: 1997-05-15 15:36:52 UTC
Raw Date: Thu, 15 May 1997 23:36:52 +0800
From: tzeruch@ceddec.com
Date: Thu, 15 May 1997 23:36:52 +0800
To: cypherpunks@algebra.com
Subject: Re: Anonymous Remailers
In-Reply-To: <01BC603F.4B529240@pc1901.ibpinc.com>
Message-ID: <97May15.112158edt.32257-1@brickwall.ceddec.com>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, 14 May 1997, Roger J. Jones wrote:
> Why is it that some who are very concerned about their personal privacy utilize anonymous remailers that:
> 1) Log all of their mail messages?
Good. They will mainly waste space on a bunch of encrypted stuff with the
possible exception of the very last entry in the chain (which may only
give the recipient, and a message, which might reveal the author when
decrypted by the recipient's key). Everything else will point to another
remailer and be readable only by it. They can log who is using it if they
are first in the chain (so run your own remailer), but all they will know
is who is using it, assuming it is not a nym.
> 2) Are in many cases reputed to be run by foreign intelligence services?
So who says they don't provide a public service :). Although I would
resent my tax money supporting something that can be done in the private
sector if I lived in such a country. There should be a move to privatize
them.
> Do they really trust the owner of the remailer? (Unless of course, it is
> their remailer?) I seem to be missing something.
I shouldn't have to unless I only use one remailer exclusively. If I use
random chains, or mixmaster type remailers, I don't HAVE TO TRUST the
remailer. The worst they could do is not pass on mail (which would show
up in the stats), or selectively not send mail, or log content when they
were last on the chain and if the message was actually plaintext at that
point.
There are a few subtleties, but if you do things right, things are very
secure. It depends if you are trying for 100% security or merely want to
avoid spam.
Return to May 1997
Return to “tzeruch@ceddec.com”