At 4:35 AM 1/2/96, Jon Lasser wrote:
The potential for traffic analysis is the danger here. If an "FBI International Data Laundering Expert" testifies in court that said data came from a site known to be frequented solely by so-and-sos, all the strong crypto in the world won't stop the average jury from convicting you.
Carl Ellison (among others, I'm sure) has suggested various means of foiling traffic analysis among a group of trusted conspirators, using a token-ring-like routing scheme. I'm not completely convinced that it's robust enough, but a variation on it is probably adaptable.
How does this differ from Dining Cryptographers approaches? --Tim May We got computers, we're tapping phone lines, we know that that ain't allowed. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^756839 - 1 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway."