Tim May wrote:
> If files are not traceable back to Sealand, then Sealand is not
> needed. The file servers could be in Sunnyvale or London.
>
> If files are traceable back to Sealand, then Sealand will have to
> deal with Interpol, Islamic fatwahs, etc.
>
> I wish them well, but it all looks like a short-lived gimmick. Good
> for P.R., not good as a long-term business.
Yup, and I don't see much of a way around it. Say they use gnutella as
a distro model, or eternity. The fact that their physical location is
being advertised is enough to invite the jihads.
GNUtella might just be the right way to pull something like this off,
but with a wide enough scope of network traffic analysis you can catch
everyone in the chain. What the UK is proposing will catch all in the
UK using it. I suppose Echelon will catch the rest...
So the question is how does one build a system to get around extereme
traffic analysis at every node? Onion is one way, but if you connect
to it, you're a suspect, etc.
--
----------------------Kaos-Keraunos-Kybernetos---------------------------
+ ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\
\|/ :aren't security. A |share them, you don't hang them on your/\|/\
<--*-->:camera won't stop a |monitor, or under your keyboard, you \/|\/
/|\ :masked killer, but |don't email them, or put them on a web \|/
+ v + :will violate privacy|site, and you must change them very often.
[EMAIL PROTECTED] http://www.sunder.net ------------