Foiling Traffic Analysis

Timothy C. May tcmay at got.net
Wed Jan 3 11:07:17 PST 1996


At 4:35 AM 1/2/96, Jon Lasser wrote:

>The potential for traffic analysis is the danger here. If an "FBI
>International Data Laundering Expert" testifies in court that said data
>came from a site known to be frequented solely by so-and-sos, all the
>strong crypto in the world won't stop the average jury from convicting you.
>
>Carl Ellison (among others, I'm sure) has suggested various means of
>foiling traffic analysis among a group of trusted conspirators, using a
>token-ring-like routing scheme. I'm not completely convinced that it's
>robust enough, but a variation on it is probably adaptable.

How does this differ from Dining Cryptographers approaches?


--Tim May

We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1  | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."










More information about the cypherpunks-legacy mailing list