Re: Foiling Traffic Analysis

At 20:02 1/2/96, Jon Lasser wrote:
When the group of packets arrives at a given station, it replaces its current encrypted packet with a new packet; if it doesn't have any new packets to send, it puts up a garbage packet that is indistinguishable from a normal packet. It then scans all the other packets and attempts to decrypt them with its private key. Any it can read, it does; all the packets are forwarded to the next station in the ring.
All participants in this network are clearly guilty of conspiracy. Their assets will be confiscated under RICO. As Brian mentioned, the law enforcement agencies are creating a surplus by such seizures. The costs associated with more prosecutions are more than offset by the revenue generated. Your computer will make a welcome addition to their budget. -- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred.
participants (1)
-
shamrock@netcom.com