Thanks for your references, I'll take them in account. I though about don't send in clear the destinatary of the message because it would be an identifier that could be used by others to censor that messages or also as a target to try to decypher them. Is this reasonable, or too much paranoid? Could be a per session public-key generated by a random seed considered enough anonymous, or my concerns would still apply (censorship and decypher target)?
2014-06-01 22:59 GMT+02:00 Michael Rogers <[email protected]>: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > On 01/06/14 20:54, [email protected] wrote: >>>> There is no way to hide metadata because you need a destination >>>> for your messages to arrive ... has to find its destinations to >>>> deliver its contents. >> >>> Yes of course... the minimum necessary for delivery is the >>> destination address. >> >> Is this absolutelly necesary to be on clear? Can't it be possible >> to be broadcasted and forwarded to all the peers in the network, or >> it would be a no sense? > > It's possible, but it wouldn't scale well. There are some routing > protocols for ad hoc wireless networks that take that approach: > > A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. SDAR: A secure > distributed anonymous routing protocol for wireless and mobile ad hoc > networks. In Proceedings of the 29th Annual IEEE International > Conference on Local Computer Networks (LCN 2004), Tampa, FL, USA, > pages 618–624, November 2004. > > R. Song, L. Korba, and G. Yee. AnonDSR: Efficient anonymous dynamic > source routing for mobile ad-hoc networks. In Proceedings of the ACM > Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), > Alexandria, VA, USA, pages 32–42, November 2005. > > B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng. Anonymous > secure routing in mobile ad-hoc networks. In Proceedings of the 29th > Annual IEEE International Conference on Local Computer Networks (LCN > 2004), Tampa, FL, USA, pages 102–108, November 2004. > > S. Seys and B. Preneel. ARM: Anonymous routing protocol for mobile ad > hoc networks. In Proceedings of the 20th International Conference on > Advanced Information Networking and Applications (AINA 2006), Vienna, > Austria, pages 133–137, April 2006. > http://www.cosic.esat.kuleuven.be/publications/article-636.pdf > > Cheers, > Michael > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.12 (GNU/Linux) > > iQEcBAEBCAAGBQJTi5RLAAoJEBEET9GfxSfMIZEH/0wZ31OjI092QJsoqgz7tKe8 > 4SX0nXsewpK050CELG5pIHNfibX+TkxOSkkZh3ZxnKxqdadhhP/wFrNej2gwmF8v > ULF6QMfPuFHT8KCI205hdw3hsqHU1HIpC7grde7yF2dQHXBQwFog08kY4RlPEPz4 > MoLOF0SSC1nZuJZ/Q5XfQo0iOXZ1SF6AMgM+m25bPhYGjzPUWMXaonZh2G7VSMj3 > VGdfxPnj4i/6Ximbofmf2+ppm7yFEiOh0aDbrnz9bCryGvcSda3GSp+NKMpOEuRN > eZ1TzMBhcVOWxxKLMp7IO7LkLOj7JOTgashipGTauDJGtGpoz4ExF6udfSnk3PY= > =QtiP > -----END PGP SIGNATURE----- > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers -- "Si quieres viajar alrededor del mundo y ser invitado a hablar en un monton de sitios diferentes, simplemente escribe un sistema operativo Unix." – Linus Tordvals, creador del sistema operativo Linux _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
