-----BEGIN PGP SIGNED MESSAGE----- [To: Just Rich <rich@c2.org>] [cc: cypherpunks@toad.com] [Subject: Re: Remailers run by spooks ] [In-reply-to: Your message of Mon, 04 Mar 96 00:11:09 EST.] <199603040511.AAA24235@bb.hks.net>
However, I also have no doubt that Strassmann and Marlow are spreading disinformation and exaggerating their capabilities in an attempt to break the web of trust and incite a witch hunt. It won't work. The answer in any case is more use of remailers, not less. Just turn up the noise level. You already know that nothing is 100% secure, but you do what you can. It's a war of attrition.
I agree with turning up the noise level. For a few weeks now I've been using the following script: #!/bin/ksh while sleep `roll 1 7 1`000 do roll 1 10000 `roll 1 200 1` | "a chain of remailers back to me" done I've deleted the actual command to do the remailing, since it is homegrown. Back at this end, I recognise the incoming mail and throw it away. So I never get to see it, but there is a steady stream of encrypted traffic both in and out. The "roll" command, by the way, is a perl script I picked up off the net, and it is very handy to have around: #!/usr/bin/perl $low = $ARGV[0]; $high = $ARGV[1]; $count = $ARGV[2]; $high = $high - $low + 1; # seed the random process, and generate a few to be thrown away. srand($$+time); for ($i = rand(1000)/50; $i >= 0; --$i) { rand(1000); } # generate for ($i = 0; $i < $count; ++$i) { $v = int(rand($high)) + $low; print $v, "\n"; } Chris McAuliffe <cmca@alpha.c2.org> (No, not that one.) -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBMTqKi4HskC9sh/+lAQGZigQAjOcE1xU08shVqA/8wdnworQVKr9nHSCh xZEa5N6pBnV6rxvLJYC8QZMkYj/OcUzyZDUg10unqBLDjtgChSBhG61F/V5RWNOc X4IuTJAt1sIxplT6UU3OvLo7AaaNdSgz886X/M4ssnlIubOo7b+jNlxccMLr7PKK FYuLndXjspg= =knru -----END PGP SIGNATURE-----