-----BEGIN PGP SIGNED MESSAGE----- On Sat, 9 Nov 1996, Mike Ingle wrote:
A theoretical discovery is needed particularly in the area of recipient anonymity. Good sender anonymity and weak recipient anonymity leads to 'hit and run' behavior such as spamming email and newsgroups, but not to anonymous markets.
The current nymservers offer pretty good security. The only problem is they are vulnerable to traffic analysis. If an attacker wants to find out whether a particular person is using a pseudonym, he could send a lot of messages to the nym and if the suspected user receives that same amount of messages in anonymously remailed traffic. This would confirm the attacker's suspicion. There are a few ways to protect against this. One way is for a person to request that email stored on the nym server be delivered. The email could be delivered as one large encrypted message. The user could also request each email individually, but this does have some drawbacks. Delivering each message as it is received is a Bad Thing. Mark - -- finger -l for PGP key PGP encrypted mail prefered. -----BEGIN PGP SIGNATURE----- Version: 2.6.3 Charset: noconv iQEVAwUBMoaT0yzIPc7jvyFpAQFJWQf9FiQUfKlgs0oI1rLx6qFB7tbxkNkMnzsx fGG4QDh8XxokWF6eJW5550mlC/kpZF81/QUHQMkbQqpqWud8Pvzxo1dBxRkhcKsC xnI44ICR2t4xDww0DOt5P3XG0FbBoQUYfeJkD3Mjw1ZNq838hSJrZjF+06sB2y7V fMd5JXJtqLWsHMvlXYpu1oHr0K4aB+iddBIERZjyDLDsXf4ejuQapio7OO1fSE1n Rk1cR+zHIh5iWLMYyHzFXMyLCOVE1PhwndOfiUlwIlI59ISu40Anl+qJ+7I7rEQu i3BJipswUOZ47V1c0Ek/DixI1F5rV6NFxd4zJlYRYB3KvcOrNwWThg== =WWzM -----END PGP SIGNATURE-----