On 15/10/2021 01:09, PrivacyArms wrote:
To clarify my question: Is there an anonymous network (GPA) for secure/private 
messaging better than Tor?

Regarding the other question: What can criminals can do to stay anonymous which 
is outside the law (hacking/stealing computers/wifi), more?

Anonymity is hard, and low-latency anonymity is almost impossible. A brief history:

In 1981 David Chaum described mix networks (including onion routing). This was only possible because of the then-recent invention of public key cryptography. This idea was then instantiated as the Cypherpunks anonymous remailer, then the Mixmaster remailer.

A further development, Mixminion, was in the works in the early to mid noughties, but was derailed when its chief coder, Nick Matthewson, decided to work on TOR instead.

Anonymous remailers could work, but they are pretty much moribund now.


The same year, in "True Names", Vernor Vinge described a "feed", whereby short encrypted messages were aggregated and broadcast. Chaum described a similar idea, incorporating dummy traffic, and other plans involving private information retrieval. [2]

None of these have come to fruition.



So no, there are no "strict" anonymous networks in existence. By "strict" I mean mathematically provable, without requiring trusting another person.

Nor are there any effective widely-deployed anonymous networks which only require trusting any one out of many people.



There are several less-than-strict techniques, which may or may not work. You could "use other people's computers" by chaining through a few web proxies. You could internet cafes, hack into wifi (perhaps using a box connected via an IR link) or relay through a chain of pwned boxen.

Sneaky people might well think of some more, but I wouldn't put them in an email. :)



Secure messaging, as opposed to anonymous messaging, where confidentiality rather than anonymity is the requirement, is of course possible - there are several apps, or you could almost write your own (don't do it, I said "almost"!).

Just make sure it is really end=to=end and there are NO dedicated [1] servers involved anywhere - there is no cryptographic need for a dedicated server in a secure messaging network. If there is one then you are trusting it to do something; and remember the 6th law:

"Only those you trust can betray you."




Peter Fairbrother

[1] by dedicated I mean you have to use a particular server. If you have to use any one of several servers it might be OK if you (can) run your own server. Or it might not. No server is safer]


[2] Chaum's 1981 MS thesis, "Untraceable Electronic Mail, Return
Addresses, and Digital Pseudonyms" contains almost all the types of strict anonymous communication ever invented, worth a read.

http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf

Vernor Vinge's True Names is of course required reading:

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjqu4Pr7MvzAhVTglwKHRBJBfEQFnoECAIQAQ&url=http%3A%2F%2Fwww.scotswolf.com%2FTRUENAMES.pdf&usg=AOvVaw0u3GgYC_zdrgFmYrmP2DAA

Reply via email to