-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tue, 4 Jul 2000, Adam Back wrote:
> So the problem is that we would like to prevent, or make MITM
> attacks against nyms who can not reveal their True Names more
> expensive to mount and maintain.
I like this problem characterization: make MITM attacks expensive or
impossible....
> The thing is we could frustrate MITM attacks if we model the set of
> pseudonymous communicants as being connected by a network with set
> of links only some proportion of which the attacker can maintain
> MITM over.
Yes! Intuitively, I thought broadcasts and multiple channels were
good. This is a more formal statement, as is your weighted decision
algorithm for distinguishing between MITM and true signatures.
> So if the nyms can communicate without MITM some of the time they
> can detect MITM. So the nyms exchange fingerprints, and hashes of
> sets of fingerprints say using hashtrees and broadcast them over any
> available channels.
Fingerprints and hashes seem a fruitful direction for thought. What
are hashtrees?
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>
iQA/AwUBOWGTNx03qOKrXodcEQKQSQCeJMicNkQlXNacb+aUgwOggvCY4gAAoPVl
dWWUbko0ewjTJ9lws0mZUaHQ
=CNaH
-----END PGP SIGNATURE-----