Chaff in the Channel (Stealth PGP work)

Mike Gurski mgursk1 at gl.umbc.edu
Sat Mar 9 22:32:31 PST 1996


On Thu, 29 Feb 1996, Nelson Minar wrote:

> As noble as "flood the detection channels" sounds, has it really ever
> succeeded? Do people who don't care about privacy day to day ever go
> through extra trouble to make other people's privacy easier? I can
> think of two public efforts to increase noise that have failed:
> putting Spook keywords in all Usenet posts, and using PGP email for
> normal day to day traffic. The failure of the second channel-flooding
> is especially notable: even people doing serious crypto hacking, with
> well established public keys, don't seem to PGP encrypt normal day to
> day traffic. It's just not convenient enough.

At one point I'd thought about setting up a "random" crontab on my
local machine to send out encrypted junk to remailers over the net via
a SLiRP connection.  It made a little more sense when I was connected
24/7.  I'm still planning on doing this sometime, probably during
Spring Break or this summer.  I don't know how useful it would be,
though.


--
|\/|ike Gurski  mgursk1 at gl.umbc.edu  http://www.gl.umbc.edu/~mgursk1/
finger or mail subject "send pgpkey" or "send index"  Hail Eris!  |Member,
1024/39B5BADD PGP Keyprint=3493 A994 B159 48B7 1757 1E4E 6256 4570|   Team
My opinions are mine alone, even if you should be sharing them.   |   OS/2







More information about the cypherpunks-legacy mailing list