[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Remailers run by spooks



-----BEGIN PGP SIGNED MESSAGE-----

[To: Just Rich <[email protected]>]
[cc: [email protected]]
[Subject: Re: Remailers run by spooks ]
[In-reply-to: Your message of Mon, 04 Mar 96 00:11:09 EST.]
             <[email protected]> 

>However, I also have no doubt that Strassmann and Marlow are spreading
>disinformation and exaggerating their capabilities in an attempt to break
>the web of trust and incite a witch hunt. It won't work. The answer in any
>case is more use of remailers, not less. Just turn up the noise level. 
>You already know that nothing is 100% secure, but you do what you can. 
>It's a war of attrition.

I agree with turning up the noise level. For a few weeks now I've been
using the following script:

	#!/bin/ksh
	while sleep `roll 1 7 1`000
	do
	    roll 1 10000 `roll 1 200 1` | "a chain of remailers back to me"
	done

I've deleted the actual command to do the remailing, since it is
homegrown. Back at this end, I recognise the incoming mail and throw it
away. So I never get to see it, but there is a steady stream of
encrypted traffic both in and out.

The "roll" command, by the way, is a perl script I picked up off the
net, and it is very handy to have around:

	#!/usr/bin/perl
	$low = $ARGV[0];
	$high = $ARGV[1];
	$count = $ARGV[2];
	$high = $high - $low + 1;

	# seed the random process, and generate a few to be thrown away.
	srand($$+time);
	for ($i = rand(1000)/50; $i >= 0; --$i) {
	    rand(1000);
	}

	# generate
	for ($i = 0; $i < $count; ++$i) {
		$v = int(rand($high)) + $low;
		print $v, "\n";
	}

Chris McAuliffe <[email protected]> (No, not that one.)

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQCVAwUBMTqKi4HskC9sh/+lAQGZigQAjOcE1xU08shVqA/8wdnworQVKr9nHSCh
xZEa5N6pBnV6rxvLJYC8QZMkYj/OcUzyZDUg10unqBLDjtgChSBhG61F/V5RWNOc
X4IuTJAt1sIxplT6UU3OvLo7AaaNdSgz886X/M4ssnlIubOo7b+jNlxccMLr7PKK
FYuLndXjspg=
=knru
-----END PGP SIGNATURE-----