Technical Remailer Analysis.
Matthew J Ghio
mg5n+ at andrew.cmu.edu
Sat Oct 1 14:45:15 PDT 1994
Hal Finney wrote:
> If I follow this, the attack is something like, every time Alice sends
> a message Bob receives one. Observing this happening over a period of
> time we conclude they are communicating. Could this be defeated by
> sending dummy messages so that Alice sends exactly 10 messages
> every day? Then the fact that Bob receives messages on some day can't
> very well be associated with Alice.
This attack can be defeated if both Alice and Bob are running remailers.
Then their correspondence is hidden in the 100 messages a day of
remailer traffic. An observer can not tell wether the messages were for
Alice or Bob, or if they were for the remailer (assuming latency was
used) or if they were bit bucket messages. Alice could even forward her
personal messages to a bitbucket (after saving a copy for herself) to
further increase security. This is why everyone should be running a
remailer if they are concerned about their privacy.
More information about the cypherpunks-legacy