Anonymous
2009-05-15 03:58:32 UTC
Paul L. Allen (***@sktb.demon.co.uk) wrote:
: In article <huff-***@edhuff.dial.net.nyu.edu>
: ***@mcclb0.med.nyu.edu (Edward J. Huff) writes:
: > The FBI, et. al., are woried about the fact that PGP now makes it possible
: > to carry out illegal conspiracies without any face-to-face meetings or any
: > evidence at all of any meeting.
: Not entirely true - traffic analysis would allow the authorities to determine
: that messages were exchanged between `Basher' Blogs, `Fingers' Smith and
: `Mad Dog' Jones prior to the capture and arrest of `Mad Dog' Jones after
: a robbery.
No. Check out the various "remailers" that make traffic analysis
extremely difficult, and will fairly soon make it intractable.
These remailers support encryption, so that a remailer node only knows
from what site it got the message and to what site it is supposed to
send the outgoing packet (which is likely still encrypted, to the
public key of the _next_ node).
If a packet is sent through this Chaum-style system of "mixes," the
traffic analyst faces a nearly hopeless task. (How hopeless is the
task depends on how many mixes, the message latency number, quantizing
of packet sizes to fixed sizes, and so on.)
If I were the FBI, I'd be panicked too. Fortunately for us, it's
already too late to stop these developments.
--Tim May
: In article <huff-***@edhuff.dial.net.nyu.edu>
: ***@mcclb0.med.nyu.edu (Edward J. Huff) writes:
: > The FBI, et. al., are woried about the fact that PGP now makes it possible
: > to carry out illegal conspiracies without any face-to-face meetings or any
: > evidence at all of any meeting.
: Not entirely true - traffic analysis would allow the authorities to determine
: that messages were exchanged between `Basher' Blogs, `Fingers' Smith and
: `Mad Dog' Jones prior to the capture and arrest of `Mad Dog' Jones after
: a robbery.
No. Check out the various "remailers" that make traffic analysis
extremely difficult, and will fairly soon make it intractable.
These remailers support encryption, so that a remailer node only knows
from what site it got the message and to what site it is supposed to
send the outgoing packet (which is likely still encrypted, to the
public key of the _next_ node).
If a packet is sent through this Chaum-style system of "mixes," the
traffic analyst faces a nearly hopeless task. (How hopeless is the
task depends on how many mixes, the message latency number, quantizing
of packet sizes to fixed sizes, and so on.)
If I were the FBI, I'd be panicked too. Fortunately for us, it's
already too late to stop these developments.
--Tim May