[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Foiling Traffic Analysis
At 4:35 AM 1/2/96, Jon Lasser wrote:
>The potential for traffic analysis is the danger here. If an "FBI
>International Data Laundering Expert" testifies in court that said data
>came from a site known to be frequented solely by so-and-sos, all the
>strong crypto in the world won't stop the average jury from convicting you.
>
>Carl Ellison (among others, I'm sure) has suggested various means of
>foiling traffic analysis among a group of trusted conspirators, using a
>token-ring-like routing scheme. I'm not completely convinced that it's
>robust enough, but a variation on it is probably adaptable.
How does this differ from Dining Cryptographers approaches?
--Tim May
We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
[email protected] 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."