CNN.com on Remailers
David Honig
honig at sprynet.com
Tue Dec 18 10:04:10 PST 2001
At 06:56 PM 12/17/01 -0600, Jim Choate wrote:
>On Mon, 17 Dec 2001, Trei, Peter wrote:
>
>> Yes, I have read the letter - they need to treat input from known remailers
>> differently due to worries over spam and flooding attacks, so they treat
>> other known remailers as priviliged sources of high volume traffic.
Can't spam be repelled by not forwarding email not encrypted to
the remailer's key?
>> This does not invalidate my point - that such special treatment could lead
>> a remop into legal problems. We have two different problems, with mutually
>> undesirable solutions.
>
>If the sending node doesn't know about the destination node, how does it
>konw where to send the traffic (even if the sender provides the address)?
>The reality is that the remailers must 'know' of each other one way or
>another. Simply being part of a 'remailer network' (anonymous or not)
>tends to already put one in a 'conspiratorial' situation.
Isn't it sufficient for a remailer node to publicly broadcast
its existance (and the protocols it handles)? This seems to work
and there is no cooperation required --just a one-way broadcast.
Mere advertising is not evidence of a conspiracy.
More information about the cypherpunks-legacy
mailing list