Re: Remailer Chaining Security?
nobody@shell.portal.com wrote >>> | What level of security is achieved by the practice of "chaining" | | messages through various "anonymous remailers"? Do these servers | | not keeps logs by which a post could be traced back through the | | chain to the source? If there is a REAL level of security | | afforded, then the question arises "how much is enough"? | Yes. If you use only one remailer, and that remailer keeps logs, then it makes it trivial for the remailer operator to find out who sent the message. If you chain remailers, then it makes it more difficult to trace it back, but the first remailer can see the source and destination, which means someone could find out if they looked. However, if you chain and use PGP, it requires the cooperation of all remailer operators involved. If someone really tried to get a lot of remailer operators to cooperate in tracing a message, someone's going to make a stink about it. Now there is the traffic analysis problem, and the time-correlation problem. This can be solved by using the slower (UUCP) remailers. "How much is enough" is something you must decide for yourself. BTW: Which remailers keep logs? Mine does... I think Chael Hall and Hal Finney do. And catalyst doesn't (or didn't awhile ago). What about the rest?
But how does one go about chaining through the remailers? I tried this and the message got lost. If indeed you can, does it just involve using more than one (anon-to) line in the header? __________________________________________________________________ Rev. St. Pope Two of the Attachment | Finger me for PGP Public Key (Secret Masters of Godzilla) | Pope Two CofA CHILhq HAIL ERIS! ALL HAIL DISCORDIA! | popetwo@interaccess.com __________________________________________________________________
participants (2)
-
ghio@cmu.edu -
Rev. B. Sanders