Alec Muffett <alec.muff...@sun.com> writes:

> In the world of e-mail the problem is that the end-user inherits a
> blob of data which was encrypted in order to defend the message as it
> passes hop by hop over the store-and-forward SMTP-relay (or UUCP?) e-
> mail network...  but the user is left to deal with the effects of
> solving the *transport* security problem.

> The model is old.  It is busted.  It is (today) wrong.

But the capabilities of encrypted email go beyond mere confidentiality
and authentication.  They include also strongly untraceable anonymity
and pseudonymity.  This is accomplished by using chains of anonymizing
remailers, each having a large random latency for mixing with other
traffic.

Connection-based communication such as Skype and OTR do not provide
this capability.  The hop by hop store-and-forward email network does.
This is not busted or wrong.  It's essential.


   stealthmail: Scripts to hide whether you're doing email, or when,
   or with whom.  mailto:stealthsu...@nym.mixmin.net


 -- StealthMonger
         <stealthmon...@nym.mixmin.net>
         <stealthmon...@nym.panta-rhei.eu.org>

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to