Remailer traffic analysis foiling

cjl cjl at welchlink.welch.jhu.edu
Wed Aug 3 14:53:10 PDT 1994



On Wed, 3 Aug 1994, Jidan wrote:

> 
> for total anon post/mail
> How workable is setting up remailers with psudo-cooperation
> so that when it recieves an anon mail it waits 20 or so min
> and then randomly sends copies of it to 5 other remailers of which
> the original reciever randomly decides which 1 of the 6 will post 
> and the rest simply discard. 
>   a 5 fold increase in traffic will make it harder to analize if
> 80% is just noise

I think that sending many copies of the same message sounds like a good
way of making sure that it ends up being monitored by some 
alleged surveillance net.  Sending dummy messages is another matter. 

A fivefold increase in traffic may or may not have an impact on analysis, 
depending on your assumptions about the adversary's capabilities.  Anyway,
you still have a message of fixed size going in one end, coming out the 
other, and landing in someone's mailbox.  The superfluous messages may in 
fact be easy to identify if they are addressed to bit.bucket at dev.null.  

C. J. Leonard                     (    /      "DNA is groovy"
                                   \ /                - Watson & Crick
<cjl at welchlink.welch.jhu.edu>      / \     <--  major groove
                                  (    \
Finger for public key               \   )
Strong-arm for secret key             /    <--  minor groove
Thumb-screws for pass-phrase        /   )
 





More information about the cypherpunks-legacy mailing list