Traceable Infrastructure is as vulnerable as traceable messages.
Tim May
tcmay at got.net
Fri Aug 3 11:49:07 PDT 2001
At 10:51 AM -0700 8/3/01, Ray Dillinger wrote:
>On Fri, 3 Aug 2001, Tim May wrote:
>
>>>and wait for the next time something happens if you're on DHCP, or
>>>they may have to get the cooperation of one or more other governments
>>>if your login trail runs outside their jurisdiction -- but ultimately,
>>>it's traceable.
>>
>>You apparently don't even understand how even simple remailer chains work.
>
>Hello, earth to Tim.
> (1) You can send anonymous mail by sending it through a remailer, but
> (2) The remailers themselves are not anonymous.
Are you dense? Do you understand the concept of nested, encrypted text blocks?
While the remailers may be "non-anonymous," this certainly does not
mean that an external attacker can know the mapping from N arriving
messages (encrypted) to N' departing messages (also encrypted, but
not the same pattern).
Do we have to draw a picture?
Do you think that knowing the locations of, for example, all of the
remailers in the world means that messages can be traced through the
network?
Have you even _thought_ about these issues which were explained a decade ago?
Do you know about DC-Nets?
> (3) If the remailers *were* anonymous, they could not operate
> because then the users would not know where to send their mails.
Actually, this is false. Pipenets and Blacknets don't require knowing
locations/identities of nodes. Using alt.anonymous.messages is
increasingly common. Go look at it if this is new to you. Left as an
exercise, though oft-discussed here in past years, is how to post
messages untraceably to it and how to read messages untraceably.
(I used a variant of this for Blacknet in 1993.)
> As long as the remailers themselves are traceable, make no mistake:
>they exist only because the lions have not yet passed a law against them.
>
> You cannot have encryption technologies advancing and leaving the law
>behind, so long as any vital part of the infrastructure you need is
>traceable and pulpable by the law.
>
You haven't even bothered to think about the technical issues, have you?
--Tim May
--
Timothy C. May tcmay at got.net Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
More information about the cypherpunks-legacy
mailing list