1997-06-20 - Anonymous browsing (was Re: Getting Back to our Radical Roots)

Header Data

From: Jeremey Barrett <jeremey@bluemoney.com>
To: “John Smith” <cypherpunks@cyberpass.net
Message Hash: 23257140b7af691f08f8243d63c0d2005fb2e5a875348fde9610bd83a19fdcbc
Message ID: <3.0.2.32.19970620150717.0082bab0@descartes.bluemoney.com>
Reply To: <199706202052.NAA05467@f16.hotmail.com>
UTC Datetime: 1997-06-20 22:14:21 UTC
Raw Date: Sat, 21 Jun 1997 06:14:21 +0800

Raw message

From: Jeremey Barrett <jeremey@bluemoney.com>
Date: Sat, 21 Jun 1997 06:14:21 +0800
To: "John Smith" <cypherpunks@cyberpass.net
Subject: Anonymous browsing (was Re: Getting Back to our Radical Roots)
In-Reply-To: <199706202052.NAA05467@f16.hotmail.com>
Message-ID: <3.0.2.32.19970620150717.0082bab0@descartes.bluemoney.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

At 01:52 PM 6/20/97 PDT, John Smith wrote:
>>The resources used to break DES, if as many people hosted remailers and
>>anonymizers on their machines, would further Cypherpunks goals a lot 
>more
>>than breaking DES, which we all know was breakable (as we know what "56
>>bits" means).
>
>There were messages here some time back about systems like anonymizer
>but chainable and using cryptography.  Did anything come of that?
>Efficient anonymous web browsing could be a killer app for crypto.
>Use anonymous web access to get to hotmail accounts like this one
>and you have anonymous email, easy to use.
>

Anonymous web browsing is definitely being worked on. However, simply 
chaining proxies ala remailer chains is not sufficient because traffic 
analysis is fairly trivial.

The question is what's the threat model. If the goal is to prevent the
server from identifying the client given limited resources, then 
www.anonymizer.com or similar is sufficient. However, the real problem
is preventing an entity with unlimited resources and control over most
of the nodes in the anonymous network from conducting successful traffic
analysis. This is an entirely different and very difficult problem.

The cpunks are getting some help in this from the Naval Research Lab
(although actually I think we're helping them not vice versa)
because the military seems to want to be able to browse anonymously too.

Jeremey.


-----BEGIN PGP SIGNATURE-----
Version: 5.0
Charset: noconv

iQCVAwUBM6r/FC/fy+vkqMxNAQEnWgQAvxvAwgMmUWfl9mSzh5Hsf3O/5OgqwzfS
fJzL5wNX9Pssr6dZuGXudD1OuQjUmha5e5+G3MJrrPOafsUCI3518kTVyLMbVuZG
fghrbj+s20Fyhj4G3FUM2UtzrGdaqIx/pqzkNcKyAKz3EF8iH6OSxdWWmhX/J650
qQgkrb7Om9M=
=iqAT
-----END PGP SIGNATURE-----

--
Jeremey Barrett                                BlueMoney Software Corp.
Crypto, Ecash, Commerce Systems               http://www.bluemoney.com/
PGP key fingerprint =  3B 42 1E D4 4B 17 0D 80  DC 59 6F 59 04 C3 83 64






Thread