Remailer Phases

Meyer Wolfsheim wolf at priori.net
Wed Aug 8 03:40:53 PDT 2001


On Tue, 7 Aug 2001, Joseph Ashwood wrote:

> > >   2. Operator probably trustworthy
> >
> > Impossible, and unnecessary. Don't assume any remops are trustworthy.
>
> Actually it is absolutely necessary. If all operators are willing to
> collude, then your precious anonymity is completely lost. A simple 
> tracing methodology can establish this. The first remailer operator 
> tracks the 
> exact outgoing message to the next collusion, the second tracks to the 
> third, etc until the message escapes, then the colluding operators track 
> back through
> the list of remailers, linking based on the intermediate value being 
> sent,
> until it reaches operator 1 who knows the sending address. This assumes 
> a best case of the sender determining the path taken through encryption. 
> Worst case the first operator can reveal the information to everyone.
>                         Joe

Run your own remailer. Chain through it at some point. As long as you 
trust yourself, there is no threat.

Who of the current remops do you trust? Why?


-MW-





More information about the cypherpunks-legacy mailing list