wcs@anchor.ho.att.com writes:
Um no. The main thing is that what is extracted with the selection key is _different_ from what was put in...
But the only things the selectioon key can extract are what the senders put in plus what the system did to it once it was there, which is not informationally different than what the senders put there.
True, just as ciphertext is not different, informationally, from plaintext. It's just a pair of transformations, both by the system, one in response to the sender and the other in response to the receiver. A bit like an airlock - if the two transformations are the right ones, extraneous information such as the identity should not pass through.
I suppose you could play some games by sending the message in multiple parts, with parts sent by 1-way anonymous remailer, but there's still a certain amount of traffic analysis you can do.
Bill
----------------------------------------------------------------------------- Rishab Aiyer Ghosh "In between the breaths is rishab@dxm.ernet.in the space where we live" rishab@arbornet.org - Lawrence Durrell Voice/Fax/Data +91 11 6853410 Voicemail +91 11 3760335 H 34C Saket, New Delhi 110017, INDIA