Foiling Traffic Analysis

Lucky Green shamrock at netcom.com
Tue Jan 2 19:59:17 PST 1996


At 20:02 1/2/96, Jon Lasser wrote:

>When the group of packets arrives at a given station, it replaces its
>current encrypted packet with a new packet; if it doesn't have any new
>packets to send, it puts up a garbage packet that is indistinguishable
>from a normal packet. It then scans all the other packets and attempts to
>decrypt them with its private key. Any it can read, it does; all the
>packets are forwarded to the next station in the ring.

All participants in this network are clearly guilty of conspiracy. Their
assets will be confiscated under RICO. As Brian mentioned, the law
enforcement agencies are creating a surplus by such seizures. The costs
associated with more prosecutions are more than offset by the revenue
generated. Your computer will make a welcome addition to their budget.


-- Lucky Green <mailto:shamrock at netcom.com>
   PGP encrypted mail preferred.








More information about the cypherpunks-legacy mailing list