[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Message Havens

> Why can't gopherhole send a random number of messages with a user selected
> cap?
> Bob just sends one tag request encrypted with gopherhole's public key, and 
> gets between 5 and [User cap] messages.  Even better, (Light bulb) Bob 
> can send the number of messages he is currently equipped to filter along 
> with the tag and gopherhole can modify this just a touch +/- 10% say just 
> to keep Bob from getting lazy and asking for the same number all the time.
> Bob can then filter the tags himself with procmail or something.  Just seems
> simpler and easier on the user while harder on traffic analysis.

Of course!  If the gopherhole already has a keypair, it may as well
be used as much as possible.  Good idea.

> With the right randomization and frequent tag changes, it is hard to 
> associate bob with any tag.  This problem becomes increasingly difficult 
> if one introduces randomly generated tags and pgp messages and if the 
> user keeps the message cap high (25-30).  Bandwidth simply cannot be 
> saved if the attacker is getting the downlink from gopherhole if you are 
> using a tag system like this.  The user just has to deal with 30 messages 
> to best avoid the traffic analysis on this side.  A tap on bob's line 
> reveals that he may have a connection with any of 25-30 real or imaginary 
> tags.  One less thing to go on if you are an attacker, fake tags are a 
> real headache.  Some clever filtering method for tags would be a nice 
> touch.  All lowercase, all between four and seven letters and nouns or 
> something...?

Yeah, it certainly isn't trivial to attack.  However, I'd like to make
sure that it's proveably hard.  I'll sit down tonight and try to muddle
through it.

> -uni- (Dark)