mail-ng
[Top] [All Lists]

Re: a few short notes

2004-02-01 21:45:44


On Mon, 2 Feb 2004 10:30, Chuq Von Rospach wrote:
that's why I don't want anoymous operations at the mail-ng level.

It strikes me that you can achieve your chain of accountability so long as
anonymous actions are *explicitly* anonymous.

And if some site along the way compromises the accountability (i.e., the spammer controls the man in the middle), you find yourself with a fascinating quandary -- how to figure out who is compromised and how to track them down.

anonymity is a serious problem here. think about it -- you're going to have to remove all tracking information, all sourcing information, and all sender information. If you don't, you aren't really anonymous, just obfuscated. If, for instance, I know what site the message originated on, you sure aren't anonymous, and in many cases you're now identified. anonymous(_at_)plaidworks(_dot_)com just isn't going to hide me very well.

Who manages this anonymity at the protocol level?

1) If it's the sender's machine, his anonymity ends as soon as a system starts adding tracking/trust information, and that information may well leave enough hints behind to allow me to subjectively identify who the sender is, or at least come really close. That defeats the purpose.

2) If it's the receiver's machine, the sender is depending on the receiving machine abiding by his request for anonymity. Hopefully, we all agree that's a non-starter, and if you don't understand why, please think about it for a while (try this scenario: you send an anonymous piece of hate mail to abuse(_at_)fbi(_dot_)gov, and expect them to respect your anonymity?)

3) some site in the middle? it's in control of neither party. The sender can't depend on that middle site abiding by the request, and the receiver may still get enough tracing information to backtrace to the sender's ID.

There is no safe way to embed anonymity down at the protocol level we're designing. That's why it needs to be at a higher level, a specific service that accepts a message, scrubs it of identifying information, and re-mails it under an identify owned by that service to guarantee anonymity.

Anything else makes assumptions about the reliability of the system that someone wanting anonymity shouldn't be making. It's faux anonymity if I can get close enough to you through tracing to guess which doorbell to push....

Your main problem is with falsified address information, not anonymous
senders.


Oh, I've had enough fun with anonymous remailers in the past that I can honestly say that's not true. Well, true at the moment, but far from forgotten.



<Prev in Thread] Current Thread [Next in Thread>