Traceable Infrastructure is as vulnerable as traceable messages.

Ray Dillinger bear at sonic.net
Fri Aug 3 10:51:04 PDT 2001


On Fri, 3 Aug 2001, Tim May wrote:

>>and wait for the next time something happens if you're on DHCP, or
>>they may have to get the cooperation of one or more other governments
>>if your login trail runs outside their jurisdiction -- but ultimately,
>>it's traceable.
>
>You apparently don't even understand how even simple remailer chains work.

Hello, earth to Tim. 
 (1) You can send anonymous mail by sending it through a remailer, but 
 (2) The remailers themselves are not anonymous.
 (3) If the remailers *were* anonymous, they could not operate 
      because then the users would not know where to send their mails.
 
   As long as the remailers themselves are traceable, make no mistake: 
they exist only because the lions have not yet passed a law against them.

   You cannot have encryption technologies advancing and leaving the law 
behind, so long as any vital part of the infrastructure you need is 
traceable and pulpable by the law.

				Bear





More information about the cypherpunks-legacy mailing list