Remailer traffic analysis foiling

cjl cjl at welchlink.welch.jhu.edu
Wed Aug 3 13:28:16 PDT 1994


Remailer hackers,

I've been thinking about the problem of traffic analysis of anonymous 
remailers and I have a question to pose to those of you whose thoughts on 
this topic are "more frequent or fully-formed".  

Would there be any advantage to giving remailers a MIRV capability?  

The idea goes like this:

The message arrives, the PGP wrapper is removed, the message is scanned 
for some specific token imbedded in the text (ala Matt Ghio's Cutmarks 
function).  That token is a divider between two outbound messages.  
These messages are sent along their respective ways.  The result is 
something like a 10K message coming in, and a 7K and a 3K message leaving.
If one of these goes to the bit bucket, it is like having added padding 
stripped off.  Alternately they each could be part of the real message, 
previously split and then sent via different paths to reduce chances of 
complete message interception.

I guess the issues involved are:

1)  How difficult would this be to code?  [Yeah, yeah "Cypherpunks write 
    code"(TM), but some of us write genetic code, not computer code :-)]

2)  What is the credible threat of traffic analysis?
	a)  Does multiplication of messages and their routing schemes create 
            problems of scale for these alleged eavesdropers?
        b)  Do you assume that if it's not a compromised server, that 
	    what goes on inside the machine is hidden? 

Now before the Zippos start flicking, I've followed the the latency vs. 
reordering argument, and accept that latency *may* acheive reordering, but 
not necessarily.  In this system though, different latencies after the 
split would seem to acheive something because without reliable size in/out 
information it would be harder to correlate message in with messages out.

Comments (incendiary or or otherwise) requested.
 
C. J. Leonard                     (    /      "DNA is groovy"
                                   \ /                - Watson & Crick
<cjl at welchlink.welch.jhu.edu>      / \     <--  major groove
                                  (    \
Finger for public key               \   )
Strong-arm for secret key             /    <--  minor groove
Thumb-screws for pass-phrase        /   )





More information about the cypherpunks-legacy mailing list