Traceable Infrastructure is as vulnerable as traceable messages.
Aimee Farr
aimee.farr at pobox.com
Fri Aug 3 23:04:19 PDT 2001
Tim May:
> Just so. And some of the recent "remailers can't work" critics
> (Dillinger, Farr) are breathtakingly ignorant of what was common
> knowledge in 1992. Worse, they haven't heeded recommendations that
> they get themselves up to speed.
I didn't say that.
I think Ray really did, either.
> There is no sign that even the technologies described above
> (wireless, throwaways, worm-based, surreptitious, etc.) are needed to
> achieve excellent untraceability. A distributed set of remailers in N
> different jurisdictions is quite robust against prosecutorial fishing
> expeditions, though not as robust as we want against attacks by much
> more capable adversaries.
>
> Ways to increase robustness have been discussed many times. (Increase
> N, increase pool sizes at each stage, adopt constant-bandwidth
> approaches like Pipenet, throw in wireless and "rooms full of
> remailers" approaches, even adopt DC-Net methods as cores for
> sub-nets.)
>
> Dillinger and Farr have described only sophomoric attacks. Even the
> remailers of 1995-6 defeated the Scientologists.
>
> Crap about IP addresses being traceable is just obfuscation to cover
> basic ignorance of how remailer networks work.
>
>
> --Tim May
>
>
>
> --
> Timothy C. May tcmay at got.net Corralitos, California
> Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
> Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
> Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
More information about the cypherpunks-legacy
mailing list