Remailer Phases

Joseph Ashwood ashwood at msn.com
Tue Aug 7 19:05:40 PDT 2001


----- Original Message -----
From: "A. Melon" <juicy at melontraffickers.com>
Subject: CDR: re: Remailer Phases


> >   2. Operator probably trustworthy
>
> Impossible, and unnecessary. Don't assume any remops are trustworthy.

Actually it is absolutely necessary. If all operators are willing to
collude, then your precious anonymity is completely lost. A simple tracing
methodology can establish this. The first remailer operator tracks the exact
outgoing message to the next collusion, the second tracks to the third, etc
until the message escapes, then the colluding operators track back through
the list of remailers, linking based on the intermediate value being sent,
until it reaches operator 1 who knows the sending address. This assumes a
best case of the sender determining the path taken through encryption. Worst
case the first operator can reveal the information to everyone.
                        Joe





More information about the cypherpunks-legacy mailing list