Reply to: RE>>Introduction: Telephone traffic analysis
I stumbled upon this great explanation of telephone traffic analysis and thought I'd share it with the list:
It is to evade this sort of traffic analysis that complex routing, batching and clustering of anon remailer traffic is being evolved.
As long as 'someone else' controls the medium thru which the messages pass, traffic analysis will be possible. It may be a large problem, but it will still be doable with sufficient motivation. When you have an untappable wire between the sender and recipient, then traffic analysis is impossible (and crypto unnecessary). In order to get to the remailer chain you mention, I (for instance) can ONLY pass thru a couple a machines, which if properly monitored, reveal the traffic flow despite the remailers. You can still beat traffic analysis (and you still need crypto), but not in this medium.