[148387] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Anonymous messaging [was: Email is securable

daemon@ATHENA.MIT.EDU (StealthMonger)
Sat Dec 7 22:01:39 2013

X-Original-To: cryptography@metzdowd.com
From: StealthMonger <StealthMonger@nym.mixmin.net>
To: cryptography@metzdowd.com
In-Reply-To: <52A30032.5040905@tesco.net> (Ron Leach's message of "Sat, 07 Dec
	2013 11:02:10 +0000")
Date: Sun,  8 Dec 2013 02:25:17 +0000 (GMT)
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============6011892125294666355==
Content-Type: multipart/signed; boundary="=-=-=";
	micalg=pgp-sha1; protocol="application/pgp-signature"

--=-=-=
Content-Transfer-Encoding: quoted-printable

Ron Leach <ronleach@tesco.net> writes:

> Yes, the CHAIN might ensure his anonymity at point of posting to the
> newsgroup, but disclosure will have occurred at point of first entry
> to the chain (and, potentially, subsequently for any honeypots
> following in the chain until the first genuine remailer).

But disclosure of what exactly?  That he is using the remailer network,
yes.  But the tail of the chain disconnects from any particular message
emerging from the exit (or none, if he uses mixmaster "dummy" feature).
The adversary is further confused if Bob is injecting a dummy message
anyway every few hours, and simply substitutes his live message for one
of the dummies which would have gone.

> It's the same problem with TOR, isn't it?  The first TOR server knows=20
> who is accessing the network.

Yes, but TOR is connection-based and deliberately low-latency, so
anonymity is not possible anyway [1,2].  (NSA-planted reflexive TOR
defenders, there's your cue.)  The remailer network is message-based and
deliberately high-latency.

> Anonymity of *access* is becoming desirable, I think.  But is it=20
> attainable?

That would be nice.  Ideas?


[1]
   ... for low-latency systems like Tor, end-to-end traffic
   correlation attacks [8, 21, 31] allow an attacker who can observe
   both ends of a communication to correlate packet timing and volume,
   quickly linking the initiator to her destination.

http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf

[2]
   ... Tor offers basically no protection against somebody who can
   measure [2] flows at both sides of the circuit ...
     --- Tor developer Roger Dingledine

http://www.mail-archive.com/liberationtech%40lists.stanford.edu/msg00022.ht=
ml


=2D-=20


 -- StealthMonger <StealthMonger@nym.mixmin.net>
    Long, random latency is part of the price of Internet anonymity.

   anonget: Is this anonymous browsing, or what?
   http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df=
33?dmode=3Dsource&output=3Dgplain

   stealthmail: Hide whether you're doing email, or when, or with whom.
   mailto:stealthsuite@nym.mixmin.net?subject=3Dsend%20index.html


Key: mailto:stealthsuite@nym.mixmin.net?subject=3Dsend%20stealthmonger-key


--=-=-=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlKjsYIACgkQDkU5rhlDCl7TJACgnxpH3lezfNP1pAexLJvn5uZT
8HUAoK1h1IyRF2JQjqj6qpxNj8HU+2QV
=Ycmq
-----END PGP SIGNATURE-----
--=-=-=--


--===============6011892125294666355==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============6011892125294666355==--


home help back first fref pref prev next nref lref last post