managing and protecting nyms...

StealthMonger StealthMonger at nym.mixmin.net
Tue Nov 10 02:18:58 PST 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

John Case <case at sdf.lonestar.org> writes:

> On Fri, 6 Nov 2009, StealthMonger wrote:

>> Please explain other ways to be practically untraceable.

> [...]

> Never touch the account, save through Tor.  So it's the same model you use 
> with a nym-server, but whereas all of your obfuscation is after your email 
> account, all of this obfuscation is prior to the email account (through 
> Tor).

Tor is not practically untraceable.  The Tor documentation asserts:

   ... for low-latency systems like Tor, end-to-end traffic
   correlation attacks [8, 21, 31] allow an attacker who can observe
   both ends of a communication to correlate packet timing and volume,
   quickly linking the initiator to her destination.

http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf

Use of a nym server is practically untraceable because of the high
random latency and mixing with other traffic provided by the
anonymizing remailers through which a nym server is controlled.



 -- StealthMonger
	 <StealthMonger at nym.mixmin.net>

 --
   stealthmail: Scripts to hide whether you're doing email, or when,
   or with whom.
         mailto:stealthsuite at nym.mixmin.net

Finger for key.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/>

iD8DBQFK9197DkU5rhlDCl4RAvjsAKCd/5ZeWkQcvkW0Mdd7mlrUa867cACgp0IO
Lpg9t5oGP7n9AWm0v+VQd6g=
=nNjJ
-----END PGP SIGNATURE-----





More information about the cypherpunks-legacy mailing list