Thanks for your references, I'll take them in account. I though about
don't send in clear the destinatary of the message because it would be
an identifier that could be used by others to censor that messages or
also as a target to try to decypher them. Is this reasonable, or too
much paranoid? Could be a per session public-key generated by a random
seed considered enough anonymous, or my concerns would still apply
(censorship and decypher target)?

2014-06-01 22:59 GMT+02:00 Michael Rogers <[email protected]>:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> On 01/06/14 20:54, [email protected] wrote:
>>>> There is no way to hide metadata because you need a destination
>>>> for your messages to arrive ... has to find its destinations to
>>>> deliver its contents.
>>
>>> Yes of course... the minimum necessary for delivery is the
>>> destination address.
>>
>> Is this absolutelly necesary to be on clear? Can't it be possible
>> to be broadcasted and forwarded to all the peers in the network, or
>> it would be a no sense?
>
> It's possible, but it wouldn't scale well. There are some routing
> protocols for ad hoc wireless networks that take that approach:
>
> A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. SDAR: A secure
> distributed anonymous routing protocol for wireless and mobile ad hoc
> networks. In Proceedings of the 29th Annual IEEE International
> Conference on Local Computer Networks (LCN 2004), Tampa, FL, USA,
> pages 618–624, November 2004.
>
> R. Song, L. Korba, and G. Yee. AnonDSR: Efficient anonymous dynamic
> source routing for mobile ad-hoc networks. In Proceedings of the ACM
> Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005),
> Alexandria, VA, USA, pages 32–42, November 2005.
>
> B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng. Anonymous
> secure routing in mobile ad-hoc networks. In Proceedings of the 29th
> Annual IEEE International Conference on Local Computer Networks (LCN
> 2004), Tampa, FL, USA, pages 102–108, November 2004.
>
> S. Seys and B. Preneel. ARM: Anonymous routing protocol for mobile ad
> hoc networks. In Proceedings of the 20th International Conference on
> Advanced Information Networking and Applications (AINA 2006), Vienna,
> Austria, pages 133–137, April 2006.
> http://www.cosic.esat.kuleuven.be/publications/article-636.pdf
>
> Cheers,
> Michael
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (GNU/Linux)
>
> iQEcBAEBCAAGBQJTi5RLAAoJEBEET9GfxSfMIZEH/0wZ31OjI092QJsoqgz7tKe8
> 4SX0nXsewpK050CELG5pIHNfibX+TkxOSkkZh3ZxnKxqdadhhP/wFrNej2gwmF8v
> ULF6QMfPuFHT8KCI205hdw3hsqHU1HIpC7grde7yF2dQHXBQwFog08kY4RlPEPz4
> MoLOF0SSC1nZuJZ/Q5XfQo0iOXZ1SF6AMgM+m25bPhYGjzPUWMXaonZh2G7VSMj3
> VGdfxPnj4i/6Ximbofmf2+ppm7yFEiOh0aDbrnz9bCryGvcSda3GSp+NKMpOEuRN
> eZ1TzMBhcVOWxxKLMp7IO7LkLOj7JOTgashipGTauDJGtGpoz4ExF6udfSnk3PY=
> =QtiP
> -----END PGP SIGNATURE-----
> _______________________________________________
> p2p-hackers mailing list
> [email protected]
> http://lists.zooko.com/mailman/listinfo/p2p-hackers



-- 
"Si quieres viajar alrededor del mundo y ser invitado a hablar en un
monton de sitios diferentes, simplemente escribe un sistema operativo
Unix."
– Linus Tordvals, creador del sistema operativo Linux
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to