CNN.com on Remailers

Trei, Peter ptrei at rsasecurity.com
Mon Dec 17 17:13:04 PST 2001


> Jim Choate[SMTP:ravage at ssz.com]
> 
> On Mon, 17 Dec 2001, Trei, Peter wrote:
> 
> > Yes, I have read the letter - they need to treat input from known
> remailers
> > differently due to worries over spam and flooding attacks, so they treat
> 
> > other known remailers as priviliged sources of high volume traffic.
> 
> If the sending node doesn't know about the destination node, how does it
> konw where to send the traffic (even if the sender provides the address)?
> The reality is that the remailers must 'know' of each other one way or
> another. Simply being part of a 'remailer network' (anonymous or not)
> tends to already put one in a 'conspiratorial' situation.
> 
> Truly robust remailers MUST be located in domains that protect speech and
> association with something similar to 'innocent until proven innocent'.
> That's the only defence against 'conspiracy'.
> 
Typical Choate, missing the point. A remailer simply gets sent a message,
applies it's decryption key, and sends the contents on to the next address
(yes, this type of remailer does not include nice features such as cover
traffic).

It has no idea if the address it received the message from is a remailer.
It has no idea if the address it forwarded the message to   is a remailer.
It doesn't need to.
Chaining is the sender's problem.
The point here is that the remailer treats other remailers exactly as it
treats source and destination nodes. There is no file on the remailer which
says "I'll treat hosts from this list specially".

This prevents the remop from having to worry about being sucked into a
conspiracy charge for a crime commited by a different remop. He doesn't
know, need to know, or want to know what other sites are remailers. He 
doesn't need to know the other remops, or communicate with them, 
except to inform the world (not just remops) that 'there is a remailer
here."

Peter Trei

 





============================================================================
================
This e-mail, its content and any files transmitted with it are intended
solely for the addressee(s) and are PRIVILEGED and 
CONFIDENTIAL.  Access by any other party is unauthorized without the express
prior written permission of the sender.  If 
you have received this e-mail in error you may not copy, disclose to any
third party or use the contents, attachments or 
information in any way, Please delete all copies of the e-mail and the
attachment(s), if any and notify the sender. 
Thank You.
============================================================================
================





More information about the cypherpunks-legacy mailing list