Re: Technological Solution

2001-05-01 Thread David Honig

At 06:32 PM 4/28/01 -0700, Tim May wrote:
People don't need to spend several months wading through cryptography 
textbooks to come up to a level that is sufficient to understand the 
real issues.)


--Tim May

In fact, crypto textbooks will teach you about the tensile strength
of steel, but not that you can build bridges and cars and guns from it.

They'll teach you protocols, but not how much it costs to bribe a 
counter-intelligence manager.

They'll teach you Chaum's math but not May's inevitabilities.



This list is uniquely useful (indeed, 'chartered' (snicker)) for the study
of the social impacts
of crypto.  Note that studying something doesn't mean endorsing it.  I end
with
two examples.

* we may lament the death of copyright but acknowledge certain socially
interesting technological trends (Moore's 'law',
bandwith-doubling-every-9-month, TCP/IP (snicker), N*pster, Gnut*lla)
leading to its demise are inevitable.

* we may lament the death of tyrants, but we acknowledge that shit happens.
 Much
like conventional historians, eh? 

We may regret that certain species are extinct but we are not making
the rules here.




Re: Technological Solution

2001-04-30 Thread Faustine

Quoting Tim May [EMAIL PROTECTED]:

 
 At 6:32 PM -0700 4/28/01, Tim May wrote:
 
 (You see, the quick review process is much better than the method 
 you suggested re: economics, that people read the main textbooks. 
 People don't need to spend several months wading through 
 cryptography textbooks to come up to a level that is sufficient to 
 understand the real issues.)
 
 I erred. I got Aimee mixed-up with Faustine.  It is Faustine who 
 argues for reading Samuelson instead of the books we normally 
 recommend.

For the record, I also said that any econ 101 textbook would do just as well: 
the only reason his name was mentioned at all was that he wrote the first intro 
textbook that came to mind. And I never said not to read the books on your 
list, never offered an alternate list, etc. If you'd like to point me to the 
ambiguous part of my saying it's a great list please do...otherwise, no need 
to misrepresent me. 

Quick review is great in that you can absorb a lot of relevant information that 
way--but you inevitably end up missing a lot too. Personally, I'm glad I spent 
about a week intensely digesting the Schneier. You only have to read an intro 
once, and I think it really helped me be able to put things in a broader 
perspective, faster. 

There's a whole continuum between sufficient to understand the issues 
and mastery of the subject(s) comprising the issues. You might say 
that feeling completely at home with the issues is something inbetween to 
shoot for. And how much you demand of yourself before you feel like you got 
there is entirely up to you.

~Faustine.




'We live in a century in which obscurity protects better than the law--and 
reassures more than innocence can.' Antoine Rivarol (1753-1801). 




Re: Technological Solution

2001-04-29 Thread dmolnar

On Sat, 28 Apr 2001, Declan McCullagh wrote:

 If only they worked. There was an interesting paper presented here
 in Pittsburgh at the info hiding workshop this week that suggested 
 a way to strengthen the somewhat-suckful mixmaster network. (Of

That would be 

A Reputation System To Increase MIX-net Reliability 
Roger Dingledine, Michael Freedman, David Hopwood, and David Molnar

IHW pre-proceedings version here:
http://www.freehaven.net/doc/mix-acc/mix-acc.ps  

Slightly longer version with more discussion:
http://www.freehaven.net/doc/mix-acc/mix-acc2.ps

Three guesses as to where (some of) the authors' interests in reputations
come from. We are currently revising the paper for the final proceedings
version. Comments welcome.

thanks,
-David




Re: Technological Solution

2001-04-29 Thread Declan McCullagh

On Sat, Apr 28, 2001 at 08:49:43PM -0700, Tim May wrote:
 Well, better than nothing. (Like I said in another article tonight, 
 the best is often the enemy of the good.) We knew even in 1992 that 
 remailers were a pale imitation of the DC Nets discussed a few 
 years earlier by Chaum and analyzed by others as well. But there were 
 no DC Nets in 1992, and so remailers were nonetheless a step above 
 what existed then (basically, the Kremvax/Kleinpaste/Julf approach).

Better than nothing is understating the case a bit, I think. The
info hiding workshop was a very interesting one that was almost
entirely cypherpunk-relevant. It seems like researchers are choosing
to present less-polished work here rather than waiting in line at
eurocrypt, for instance, which makes it more timely, probably.

The program's at:
http://www.cert.org/IHW2001/

There's always a tension between the corporate-watermarking folks and
the anon-privacy folks at these types of events, and this year was no
exception. But it hasn't split into two yet, and seems set to stay
intact for at least one more round in 18 months.

-Declan




Re: Technological Solution

2001-04-29 Thread Tim May

At 11:22 PM -0400 4/28/01, Declan McCullagh wrote:
On Sat, Apr 28, 2001 at 06:32:08PM -0700, Tim May wrote:
  None of the non-cryptographic methods are very resistant to legal,
  technical, sniffing, and black bag attacks. And only multiply-chained
  encrypted-at-each-stage messages, a la remailers, are adequate for
  high-value messages.

If only they worked. There was an interesting paper presented here
in Pittsburgh at the info hiding workshop this week that suggested
a way to strengthen the somewhat-suckful mixmaster network. (Of
course, the network will never be even somewhat reliable until
sufficient incentive -- ie digital cash or somesuch -- exists for
running one.) At least one active cypherpunk was involved in writing
that paper, and I cited it in my Wired article this week.

Well, better than nothing. (Like I said in another article tonight, 
the best is often the enemy of the good.) We knew even in 1992 that 
remailers were a pale imitation of the DC Nets discussed a few 
years earlier by Chaum and analyzed by others as well. But there were 
no DC Nets in 1992, and so remailers were nonetheless a step above 
what existed then (basically, the Kremvax/Kleinpaste/Julf approach).

I also saw at least two list members cited in your article (or 
perhaps in other articles dealing with the same conference): Ulf 
Moeller and David Molnar.

I didn't check out the program for the conference, but it seems to me 
beyond any doubt that a lot of the current work at IBM and NRL and 
whatever on information hiding was outlined by our own posts in 
1992-94, the period of major ferment.

(My own first article on Usenet on using the LSBs of sound files and 
images for steganography was in around 1990-91. Someday the Usenet 
archives for sci.crypt will go back that far and I'll be able to 
prove it. There may have been ideas prior to mine, of course, but 
mine was pretty early in the game.)

--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: Technological Solution

2001-04-29 Thread John Young

Tim May wrote:

None of the non-cryptographic methods are very resistant to legal, 
technical, sniffing, and black bag attacks. And only multiply-chained 
encrypted-at-each-stage messages, a la remailers, are adequate for 
high-value messages.

Those who've read it know that Jim Bamford's Body of Secrets ends
with a paragraph on NSA's being unable to cope with the spread of
communications protection technology and has come to rely more
and more on the Special Collection Service, a joint NSA-CIA black
bag operation and other methods of gaining access to targeted material.

This comes after decades of NSA disparaging the CIA's reliance on
HUMINT in favor of COMINT, ELINT, and a host of technological
intelligence gathering methods. Bamford says that NSA's prowess in
these methods accounts for its humongous growth into the premier
intel agency -- in budget and in personnel. Until the technology it
invented, fostered and funded made its way into the private world
and then to other countries intel (and allegedly criminal) organizations.
From computers to crypto to means to crack or get around those.

What will come of Special Collection Service application inside the
United States as the fervor for homeland defense burgeons and 
the redefinition of foreign enemies to include anyone in the US
considered to be a threat, is worth pondering, in particular as SCS
techniques are shared with domestic agencies to fight the drug war
and for counterterrorism -- all domestic agencies now becoming
rapidly militarized in policy, training, equipment and close working
with DoD. 

Recall DEA planting the bug on Jim Bell for IRS -- the
agency is the most militarized due to the DoD and intel agencies
being ordered to fight the drug war in the US and overseas. 
Recall, too, the amazing 30 agents which raided Jim's home, 
according to trial testimony by Jeff Gordon, the were all shocked
and frightened at the chem-warfare stuff allegedly found there,
until the EPA calmed the tough guys. That's the reason Jim's 
home is listed in the EPA's most hazardous sites compendium 
for the year of the raid.

Last week, as Declan noted there were a series of congressional
hearings on homeland security legislation and increased funding
for combating high-tech crime. We offer the lengthy testimony
on several bills providing for homeland defense and combating
terrorism:

  http://cryptome.org/homeland-terr.htm  (286K)

As I noted a few days ago, information is now listed with nuclear,
biological and chemical threats to the nation, and requires similar
intelligence about its danger to the homeland.

This could lead to the the technologies Tim lists being defined
as homeland information-terrorist threats as our very own Stasi
secret police grows rapidly -- informers squealing on family
members, vast lists of suspects, and so on. No wonder the
CIA has held on to the East German lists of enemies of the
state -- its own citizenry -- so fervently. 

US intel is looking for reasons to live and where best than pursuing
you know who, ably assisted by the industry set up by ex-intel
members. Those down-sized by the end of the Cold War got
bills to pay.

Finally, reading the NYT account of Kerry's team killing the 
Vietnamese is sobering. The article is much more disturbing
than accounts of it have portrayed. Kerry's and other killers'
spin over the years have induced an intolerance for reading
the grim shit that the military does when it is out of control.

And be sure to reflect on Bamford's account of the Joint
Chiefs planning to fake a terrorist attack on the US to warrant
a Cuban offensive. That shit could be in the works even
now -- homeland defense is aiming to be a humongous
growth industry. One easy way to get that underway is to
fake a nationally disruptive infowar attack -- or is that already 
underway.




Re: Technological Solution

2001-04-29 Thread Tim May

At 6:32 PM -0700 4/28/01, Tim May wrote:

(You see, the quick review process is much better than the method 
you suggested re: economics, that people read the main textbooks. 
People don't need to spend several months wading through 
cryptography textbooks to come up to a level that is sufficient to 
understand the real issues.)

I erred. I got Aimee mixed-up with Faustine.  It is Faustine who 
argues for reading Samuelson instead of the books we normally 
recommend.

Apologies to both chicks.


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: Technological Solution

2001-04-29 Thread Tim May

At 2:24 PM -0500 4/28/01, Aimee Farr wrote:
Reading the IMC gag order, Henson, the latest anonymous poster stuff, and
Tim et. al. beating my head in pavement

Since many forums don't allow for 'nymity, (or people just don't), what
about a protected/offshore self-destruct quicktopic-like service:
http://www.quicktopic.com/7/H/Kf6X7D9whDPx

I use a quicktopic link in hyperlinked forums and email lists to avoid snoop
bots, archival, and to disassociate the conversation to someplace that
allows people to slip into a nym jacket. (I even have Aimee's Fightin'
Rooster Pit for flame warrin' lawyers.)

I'm sure this is a stunningly stupid idea... but it would seem to put people
in (more) control of their content, instead of depending on the web site or
service to adopt a solution for them.

You're conflating many diverse issues, and, yes, picking a weak 
approach as a cure-all. (Note that I didn't even choose to heed your 
Kick me! sign by agreeing with you that it is a stunningly stupid 
idea. It's not stunningly stupid to use Hotmail, MyDeja (before it 
went away), etc. Many on this list have been doing so for years.)

The conflation comes as follows:

* Keith Henson chose to post under his own name, to appear in person 
at COS offices and recruiting centers, to picket, and so on. He was 
not trying to be anonymous or pseudonymous, so your proposal above 
would be pointless in his case. Likewise, I choose to post under my 
own name for most of my posts.

(And, BTW, as you are new, Keith was on our list for a while. I've 
known Keith since 1976, and he's in the same Bay Area circles that 
overlap so often.)

* Lots of ways exist to disassociate articles and comments from True 
Names. Remailers, nym servers, Hotmail, MyDeja, throwaway accounts, 
Web-to-mail, etc. Not having looked at the quicktopic thing you 
recommend, I can't say whether it's better or worse than most of 
these other methods.

* Many posters on Cypherpunks are already using such methods...or did 
you think Lucky Green and Eric Cordian are government-sanctioned 
meatspace names?

* Interestingly, most of the recent publicity over courts being asked 
to force names to be revealed has involved services like Silicon 
Investor, Raging Bull, and Yahoo fora, which DO support pseudonyms. 
In some cases the services have refused to reveal the true names 
associated with nyms on their boards.

None of the non-cryptographic methods are very resistant to legal, 
technical, sniffing, and black bag attacks. And only multiply-chained 
encrypted-at-each-stage messages, a la remailers, are adequate for 
high-value messages.

If you plan to stay on this list, I think it's long past time that 
you spend several hours reviewing past developments in these areas.

(You see, the quick review process is much better than the method 
you suggested re: economics, that people read the main textbooks. 
People don't need to spend several months wading through cryptography 
textbooks to come up to a level that is sufficient to understand the 
real issues.)


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: Technological Solution

2001-04-28 Thread Tim May

I wrote:

---

If you plan to stay on this list, I think it's long past time that 
you spend several hours reviewing past developments in these areas.

(You see, the quick review process is much better than the method 
you suggested re: economics, that people read the main textbooks. 
People don't need to spend several months wading through cryptography 
textbooks to come up to a level that is sufficient to understand the 
real issues.)

---

This is still an important issue, even though Aimee seems to think 
her head is being bashed on the pavement on this issue.

The best is often the enemy of the good.


My reading list suggestion had included several important books for 
list members to read that covered the economics topics of most 
interest and importance to our themes. The authors you have already 
seen. The topics are, roughly: libertarian viewpoints, public choice 
theory, game theory, the role of evolution and learning, preference 
revealing, etc.

It is not essential to become an expert in game theory, or 
cryptography, or economics, or law. Rather, it is important to get 
up to speed quickly...IF one plans to contribute to a mailing list 
or discussion forum.

As this applies to crypto, for example, it is very important 
important that members of the list understand roughly how PGP is 
used, how remailers work, what the BlackNet experiment showed, how 
reputations solve many distributed problems of interest to us, and so 
on--I could generate a long list of topics, and in fact _have_ 
generated such a list in the form of the Cyphernomicon. This is 
_much_ more important than that they spend several months reading 
Schneier, or Koblitz, or any of the dozen or so main textbooks. 
(Ideally, they should have one of these books to look at while 
reading about PGP, remailers, etc.)


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




RE: Technological Solution

2001-04-28 Thread Aimee Farr

Tim said:

 At 2:24 PM -0500 4/28/01, Aimee Farr wrote:
 Reading the IMC gag order, Henson, the latest anonymous poster stuff, and
 Tim et. al. beating my head in pavement
 
 Since many forums don't allow for 'nymity, (or people just don't), what
 about a protected/offshore self-destruct quicktopic-like service:
 http://www.quicktopic.com/7/H/Kf6X7D9whDPx
 
 I use a quicktopic link in hyperlinked forums and email lists to
 avoid snoop
 bots, archival, and to disassociate the conversation to someplace that
 allows people to slip into a nym jacket. (I even have Aimee's Fightin'
 Rooster Pit for flame warrin' lawyers.)
 
 I'm sure this is a stunningly stupid idea... but it would seem
 to put people
 in (more) control of their content, instead of depending on the
 web site or
 service to adopt a solution for them.

 You're conflating many diverse issues, and, yes, picking a weak
 approach as a cure-all.

Well, if you tricked out an offlink solution, maybe it wouldn't be weak.
Obviously, if there was a solution here, somebody would have already done
it.

 (Note that I didn't even choose to heed your
 Kick me! sign by agreeing with you that it is a stunningly stupid
 idea.

Always the gentleman, Mr. May.

 It's not stunningly stupid to use Hotmail, MyDeja (before it
 went away), etc. Many on this list have been doing so for years.)

 The conflation comes as follows:

 * Keith Henson chose to post under his own name, to appear in person
 at COS offices and recruiting centers, to picket, and so on. He was
 not trying to be anonymous or pseudonymous, so your proposal above
 would be pointless in his case. Likewise, I choose to post under my
 own name for most of my posts.

Yes.

 (And, BTW, as you are new, Keith was on our list for a while. I've
 known Keith since 1976, and he's in the same Bay Area circles that
 overlap so often.)

Hm.

 * Lots of ways exist to disassociate articles and comments from True
 Names. Remailers, nym servers, Hotmail, MyDeja, throwaway accounts,
 Web-to-mail, etc. Not having looked at the quicktopic thing you
 recommend, I can't say whether it's better or worse than most of
 these other methods.

Look it up. It's easy, 20 seconds. Sheeple food. Again, I was thinking about
a crypto-savvy offlinking solution. Obviously, this is a dumb idea for some
reason, or not doable.

 * Many posters on Cypherpunks are already using such methods...or did
 you think Lucky Green and Eric Cordian are government-sanctioned
 meatspace names?

No, I did not think so.

 * Interestingly, most of the recent publicity over courts being asked
 to force names to be revealed has involved services like Silicon
 Investor, Raging Bull, and Yahoo fora, which DO support pseudonyms.
 In some cases the services have refused to reveal the true names
 associated with nyms on their boards.

I know this.

 None of the non-cryptographic methods are very resistant to legal,
 technical, sniffing, and black bag attacks. And only multiply-chained
 encrypted-at-each-stage messages, a la remailers, are adequate for
 high-value messages.

Well, I was thinking obviously something dumb.

 If you plan to stay on this list, I think it's long past time that
 you spend several hours reviewing past developments in these areas.

I think it's long past time that you spent several hours kissing my ass. I
too, suffer from delusional fantasies. :)

 (You see, the quick review process is much better than the method
 you suggested re: economics, that people read the main textbooks.
 People don't need to spend several months wading through cryptography
 textbooks to come up to a level that is sufficient to understand the
 real issues.)

That other chick said that, as you were kind enough to note.

~Aimee




RE: Technological Solution

2001-04-28 Thread Tim May

At 9:43 PM -0500 4/28/01, Aimee Farr wrote:
Tim said:

   * Keith Henson chose to post under his own name, to appear in person
  at COS offices and recruiting centers, to picket, and so on. He was
  not trying to be anonymous or pseudonymous, so your proposal above
  would be pointless in his case. Likewise, I choose to post under my
  own name for most of my posts.

Yes.

  (And, BTW, as you are new, Keith was on our list for a while. I've
  known Keith since 1976, and he's in the same Bay Area circles that
  overlap so often.)

Hm.

Hm, indeed. The Church of Scientology case is a good example to look at.

First, I am not a COS critic. Yeah, I've known since I was knee high 
to a hobbit that Dianetics, er, Scientology was a crock. That is, 
since I first read up on it in about 1967 (a Life magazine article, 
IIRC.) I followed the crapola about the engrams and the clams and 
Xenu for the next 30 years or so. When my friend Keith Henson decided 
to make war on the Church of Scientology, I said to him Why bother? 
They're no worse than Catholics who practice ritual cannibalism and 
induce gullible peasants to help build their churches of ivory and 
gold.

Keith got a rush out of fighting the war. Me, I hate lawyers, I hate 
the term pro se, and I have seen too many of my friends wading out 
into the Big Muddy of the law.

Also, I _despise_ the enthusiasm I see in the anti-COS movement 
toward moves by fascist states like France and Germany to declare 
Scientology an illegal religion. And I despise the calls for 
revocation of their tax status, etc. What's good enough for the 
Baptists and Rastafarians and Fribtertarians ought to be good enough 
for the Scientologists.

Nevertheless, I remain a friend of Keith Henson.

However, there are interesting links between the COS issue and 
Cypherpunks. Turns out that the war really started when someone 
posted the NOTS secret Church doctrines on alt.religion.scientology 
using Julf Helsingius' PENET mailing service. The Church flipped 
out, this was in early 1995, and launched a court battle to force 
Julf to reveal who the author was. The Julf mailing service was based 
on the work of an American, Karl Kleinpaste. It was not a true 
Cypherpunks-style remailer (based on the ideas of David Chaum, 
myself, Eric Hughes, Hal Finney, and others).

Eventually the Finnish courts forced Julf to reveal the mapping. 
_Then_ it traced back to a Cypherpunks remailer chain, to a nym 
account at C2.net. That is, to more remailers. The trail stopped cold.

(C2Net was run by our own Sameer Parekh and several other list 
members, including Doug Barnes and Sandy Sandfort. When C2Net changed 
its business model, most of its nym services transferred to Lance 
Cottrell, who still runs various services.)

Is this too much history? Perhaps. But it shows the deep links 
between topics some so glibly comment on and what we've been working 
on for more than a decade.

Much of this is covered in my Cyphernomicon. I urge you to get 
yourself up to speed, or to leave the list. Your provocative 
quarrels have grown tiresome.


  * Lots of ways exist to disassociate articles and comments from True
  Names. Remailers, nym servers, Hotmail, MyDeja, throwaway accounts,
  Web-to-mail, etc. Not having looked at the quicktopic thing you
  recommend, I can't say whether it's better or worse than most of
  these other methods.

Look it up. It's easy, 20 seconds. Sheeple food. Again, I was thinking about
a crypto-savvy offlinking solution. Obviously, this is a dumb idea for some
reason, or not doable.

I specifically didn't say it was dumb--that's your chick insecurity 
thing showing.

What I pointed out is that such forms of weak nyms have been common 
for half a dozen years.


  * Interestingly, most of the recent publicity over courts being asked
   to force names to be revealed has involved services like Silicon
   Investor, Raging Bull, and Yahoo fora, which DO support pseudonyms.
   In some cases the services have refused to reveal the true names
   associated with nyms on their boards.

I know this.


But you were the one who suggested a solution to the linkability 
problem...when in fact your solution is no stronger than what Silicon 
Investor and Raging Bull already have as the default.




  None of the non-cryptographic methods are very resistant to legal,
  technical, sniffing, and black bag attacks. And only multiply-chained
  encrypted-at-each-stage messages, a la remailers, are adequate for
  high-value messages.

Well, I was thinking obviously something dumb.

There's that chick thing again.


  If you plan to stay on this list, I think it's long past time that
  you spend several hours reviewing past developments in these areas.

I think it's long past time that you spent several hours kissing my ass. I
too, suffer from delusional fantasies. :)

I suggest that you spend a few hours or tens of hours catching up 
and your response is some kind of 8th-grade schoolgirl joke.


--Tim May


Re: Technological Solution

2001-04-28 Thread Tim May

At 10:09 PM -0400 4/28/01, John Young wrote:

Finally, reading the NYT account of Kerry's team killing the
Vietnamese is sobering. The article is much more disturbing
than accounts of it have portrayed. Kerry's and other killers'
spin over the years have induced an intolerance for reading
the grim shit that the military does when it is out of control.


We sent Lt. Calley to prison for life for being the officer in charge 
during My Lai. Will we send Lt. Kerry to prison for life for the same 
thing?

Don't count on it. Calley was a red neck, what the COS calls fair 
game. Kerry is a Beloved Liberal. Hence his crimes must be Explained 
Away. Already this is happening. Kerry will likely end up a Victim.


And be sure to reflect on Bamford's account of the Joint
Chiefs planning to fake a terrorist attack on the US to warrant
a Cuban offensive.

And the plan to pin the blame on a possible John Glenn space failure 
on information warfare from Cuba. (The plan was that if John 
Glenn's mission in 1962 failed, the story would be that Havana had 
been beaming interference rays at Cape Canaveral.)

Fidel was the Jim Bell of 1962.

--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: Technological Solution

2001-04-28 Thread Declan McCullagh

On Sat, Apr 28, 2001 at 06:32:08PM -0700, Tim May wrote:
 None of the non-cryptographic methods are very resistant to legal, 
 technical, sniffing, and black bag attacks. And only multiply-chained 
 encrypted-at-each-stage messages, a la remailers, are adequate for 
 high-value messages.

If only they worked. There was an interesting paper presented here
in Pittsburgh at the info hiding workshop this week that suggested 
a way to strengthen the somewhat-suckful mixmaster network. (Of
course, the network will never be even somewhat reliable until
sufficient incentive -- ie digital cash or somesuch -- exists for
running one.) At least one active cypherpunk was involved in writing
that paper, and I cited it in my Wired article this week.

-Declan