[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Long-Lived Remailers
At 20:40 22 May 96 NSA operative Loren James Rittle <[email protected]>
wrote...
(This was originally me. Wow.)
> >::
> >Remailers-To-Chain: 7
> >Remailers-To-Avoid: [email protected]
> >Final-Destination: [email protected]
>
> This will not work. The original sender must pick the path himself,
> if maximum encryption to hide the final destination is to be used.
> The properly used cypherpunks-style remailer network provides that as
> long as even one remailer in the chain is trustworthy, your secret is
> safe. Under your scheme, if the first remailer is untrustworthy,
> everything is blown. This is because unless the original sender
> pick's the path (or at least the last hop explicitly), the final
> destination and message must be available to each hop.
Well, I freely admit that it was just a notion that sort of came
to me whilst at the terminal, with a beer on the desk. The sort
of thing that often impairs my already-limited judgment :)
Although... is this a possible way to lessen remailer-operator
liability? If it is known that every remailer along the
way chooses another remailer at random, it might become
less likely to hold any given last-hop remailer liable
for the CO$ documents spewed forth from it. It would
become necessary to keep track of the final destination and
to decrypt at every stage, unless there's a set Last-Hop:
header; but that would defeat the whole purpose. Having
traffic going all over the place randomly might be useful
to defeat traffic analysis, though.
I think I've just argued myself out of the whole idea.
Never mind :)
dave
ObCPList: Have I been killfiled yet? If you don't see
this message, send me a note :)
---- David Smith Box 324 Cape Girardeau MO USA 63702
http://www.prairienet.org/~dsmith [email protected]
Reality is only for those lacking in true imagination...
Send mail w/'send pgp-key' in subject for PGP public key