by the appropriate key and presented. Other messages are discarded.
[1] See mailto URL below.
--
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what?
http://groups.google.ws
it will indeed release that secret.
(For example, in one implementation -- NOT CRYPTOGRAPHICALLY STRONG -- a
secret file's access permissions can only be granted by the robot.)
--
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity
of a dead man switch
in the present case.
[1] http://lists.randombit.net/pipermail/cryptography/2012-September/thread.html
--
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what
.
For these applications, the security has to be in the message, not the
connection. Offline verification is essential.
-- StealthMonger
stealthmon...@nym.mixmin.net
--
stealthmail: Scripts to hide whether you're doing email, or when,
or with whom.
mailto:stealthsu
.
stealthmail: Scripts to hide whether you're doing email, or when,
or with whom. mailto:stealthsu...@nym.mixmin.net
-- StealthMonger
stealthmon...@nym.mixmin.net
stealthmon...@nym.panta-rhei.eu.org
James A. Donald [EMAIL PROTECTED] writes:
Of course, the old cypherpunk dream is a system with end to end
encryption, with individuals having the choice of holding their own
secrets, rather than these secrets being managed by some not very
trusted authority
We discovered, however,
, untraceable nyms may be
the only way that one can live as a responsible adult, rather than a
subject of a nanny state.
-- StealthMonger
[EMAIL PROTECTED]
[EMAIL PROTECTED]
--
stealthmail: Scripts to hide whether you're doing email, or when,
or with whom. mailto:[EMAIL
is
online, real-time. Even if other clues are erased, there's still
traffic analysis in this case.
What the offline paradigm has going for it is the possibility of true,
untraceable anonymity through the use of anonymizing remailers and
related technologies.
-- StealthMonger [EMAIL PROTECTED
off-line does the option exist of untraceable traffic mixing such
as remailer chains.
This subject is on-topic here because cryptography is an indispensable
ingredient of these untraceable traffic mixes.
-- StealthMonger
[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL
latency and can be
traced by traffic analysis.
-- StealthMonger
[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED]
--
stealthmail: Scripts to hide whether you're doing email, or when,
or with whom. http://stealthsuite.afflictions.org
Ivan Krstic [EMAIL PROTECTED] writes:
Calling this piercing network anonymity in real time is highly
misleading; in reality, it's more like making it bloody obvious
that there's no such thing as network anonymity.
No. Ever hear of Chaum's Dining Cryptographers [1]? Anonymity
right there at
[EMAIL PROTECTED] writes:
eTelemetry Locate [Image]
Locate dynamically discovers, correlates and archives the
person behind the IP address ...
Another reason to use StealthMail -- see package description below.
StealthMail still needs an
. In a version downloaded via the Agora
web-to-mail gateway at Sat, 29 Apr 2006 03:42:05 +0900 (JST), the
second sentence reads PGP says its open source encryption code also
guarantees no back doors. (full stop)
-- StealthMonger
. It has
been in everyday use for years, although not widely. Details on
request. I am looking for someone to host it. Any volunteers?
-- StealthMonger
[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED
James A. Donald [EMAIL PROTECTED] writes:
... email should be sent by a direct connection from the client to
the recipient mail server, rather than this store and forward crap.
This would eliminate the only available technique for strong anonymity
or pseudonymity. Strong anonymity or
15 matches
Mail list logo