[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
/dev/null for e-mail; remailer diffusion structures
Like zero in arithmetic, the "device" /dev/null serves a useful purpose
as a kind of "syntatic glue" for Unix shell programs. I wonder if
such a "bit bucket" for mail might also be useful for anonymous remailers.
A couple examples:
* To provide multiple endpoints for a mail message, so that
the remailer list becomes a tree (or at least one branch
with a bunch of leaves). This might be done with syntax
like
Request-Remailing-To: [email protected]
<remail@tamsun decrypts to reveal>
Request-Remailing-To: [email protected]
Cc-Bit-Bucket: [email protected]
Cc-Bit-Bucket: [email protected]
where "Cc-Bit-Bucket" causes the tamsun remailer to randomly
generate a message of identical size, paste a "Bit-Bucket:"
header, encrypt it with the hfinney remailer's public key,
and send it to hfinney. When the hfinney remailer decrypts the
message and sees the "Bit-Bucket:" header it deletes the
message. remail@tamsun repeats this process with
[email protected], and sends the real mail message
on to [email protected]. To the traffic
analyzer, bit bucket messages are indistinguishable from
real ones (as long as the sender properly encrypted
the next message layer with [email protected]'s public
key).
Remailer bit bucket branching might be useful for adding confusion
when it's impractical to delay the mail to mix it with other
traffic (either because it's time sensitive or due to
lack of other traffic).
Bit bucket accounts could be useful if the destination receives a
regular, identifying pattern of traffic (eg a unique number or size of
encrypted messages). To foil traffic analysis, set up a bunch of
pseudonymous accounts at various sites that serve no other purpose
than sending and receving bit bucket messages. It then looks like
many sites are receiving that pattern of traffic.
* To provide endpoints for confusion & diffusion loops.
For example:
Request-Remailing-To: [email protected]
<[email protected] decrypts to reveal>
Cc-Loop: 7 iterations: [email protected], [email protected]
Request-Remailing-To: [email protected]
Does the same as above, except the randomized carbon copy is
put in a loop between remail and hfinney (in real life we'll want
more than two remailers in the loop). After 7 iterations
remail dumps the message, terminating the loop. Instead of
"Bit Bucket:" the remailers might paste a loop counter, where
0 causes the message to be terminated.
Remailers might set limits on the number of
loops and destination sites, charge postage, or both,
to make sure these techniques don't soak up the available
bandwidth. With sufficient bandwidth and software tools
we might get fancy and be able to choose routing
patterns from trees, acyclic and cyclic graphs,
randomized branching, fractal branching, etc.
if we find any such patterns better at thwarting traffic
analysis.
Nick Szabo [email protected]