[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Eternity Services
Tim May wrote:
> I would have thought that a much more robust (against the attacks above)
> system would involve:
>
> - nodes scattered amongst many countries, a la remailers
>
> - no known publicized nexus (less bait for lawyers, prosecutors, etc.)
>
> - changeable nodes, again, a la remailers
>
> - smaller and cheaper nodes, rather than expensive workstation-class nodes
>
> - CD-ROMS made of Eternity files and then sold or distributed widely
>
> - purely cyberspatial locations, with no know nexus
>
> (I point to my own "BlackNet" experiment as one approach.)
>
> It may be that the architectures/strategies being considered by Ryan
> Lackey, Adam Back, and others are robust against the attacks described
> above.
>
> ...
>
> Comments?
There is one thing that comes to mind that was just a topic covered on
this
list and that is the use of cellular/wireless/RF/ham for connections to
said machines.
Obviously, this would make seizure more difficult (and perhaps increase
the
likelyhood of prior warning, if for example, cellular service was
suddenly
cut off).
I am currently studying some parallels between the established FCC
tolerance
of ham radio self-regulation vis-a-vis anonymous remailers. I haven't
yet
drawn up my opinions, as they are still being formed. I think that this
might be one avenue to look down as there is obviously a type of legal
precident in what is allowed/tolerated under obvious FCC jursidiction,
whereas the jurisdiction over IP is obviously still ambiguous.
--David Miller
middle rival
devil rim lad
Windows '95 -- a dirty, two-bit operating system.