Re: "Dr. Roberts" and his advice to the list

Timothy C. May wrote:
At 10:25 AM -0800 3/23/97, "Dr. Roberts" wrote:
I wouldn't be so certain about this. Consider the fact that the remailers can be initially studied through relatively _pure_ analysis, for starters. i.e. - a series of slow periods of remailer use where and entity can ensure that almost all of those 100 messages belong to them. Thus the remailer can be studied for non-random patterns that may be unknown even to the operator himself. Then consider the fact that many of the people using remailers have habits and patterns that can easily be studied and followed. i.e. - Time periods online, standard delay time used in posting commands, frequency and volume of their posts. You must also consider context and syntax analysis that point to the true author of anonymous posts, and the fact that, once known, their personal systems can be monitored to reveal the exact time and nature of their input into the remailers. Even knowledge of killfiles can eliminate some of the overhead for traffic analysis, eliminating some sources as being responsible for volume of anonymous email directed at certain subjects or authors. Many of the factors involved in traffic analysis can be obtained outside of the realm of actual input and output of the remailers themselves, thus narrowing the range of _unknown_ factors in that analysis. Certainly there has been much thought and consideration given to the remailer system, by people who allow for various methods of attack on and/or analysis of their system. However, the assumption of 100 _random_ messages can drop pretty fast when one takes into account the number of factors that may turn some of these messages into quantifiable and easily analyzed entities. Add to this the possibility of factors that are known to the attackers, but not to the defenders, and the margin of security drops even further. Care must be taken to realize that even if one is making efforts to conceal their email traffic, that the results of their efforts are also affected by the person who always posts between 4 and 6 pm, who always posts via the same remailer and who always uses a 2 hour delay command in his posts. One needs to remember, as well, that with the capabilities of autobots and switching mechanisms, that to flood a system or systems at certain critical times is an insignificant obstacle to inputing a large quantity of _know_ data into the frame of analysis.
This is an asinine statement. If you are interested in furthering the interests of privacy through encryption and remailers, why don't you aide someone asking for pointers to better information? Is this list reserved for those who already know it all? Can you say "statist?" Sure, you can.
If all information was in those articles, then I suspect that the remailers would already be "rock solid." Rather than living in the past, as if all possibilities had already been discussed and decided, it might better serve some list members to take their hard-earned knowledge and apply it to today's situation, with new technologies, methodologies, routings, etc. Not only have these things changed, but the types and number of people who use them have also changed, thus changing the scope of possible approaches to traffic analysis. TruthMonger S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
participants (1)
-
nobody@huge.cajones.com