[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Fixed more typos, changed omega.c2.net to alpha.c2.n...
Update of /home2/freehaven/cvsroot/doc/pynchon-gate
In directory moria.mit.edu:/tmp/cvs-serv14355
Modified Files:
pynchon.bib pynchon.tex
Log Message:
Fixed more typos, changed omega.c2.net to alpha.c2.net, added cite for
alpha. (Is there a better one, perhaps by Matt Ghio?)
Index: pynchon.bib
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.bib,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -d -r1.1 -r1.2
--- pynchon.bib 26 Jan 2004 08:44:05 -0000 1.1
+++ pynchon.bib 26 Jan 2004 09:43:01 -0000 1.2
@@ -237,6 +237,15 @@
www_txt_url = {http://www.eskimo.com/~weidai/pipenet.txt},
}
+@misc{alpha-faq,
+ title = {FAQ for the ALPHA.C2.ORG Remailer},
+ author = {Andre Bacard},
+ year = {1995},
+ month = {October},
+ howpublished = {Usenet post},
+ www_txt_url = {http://groups.google.com/groups?selm=4q4tsr%248ui%40crl14.crl.com&output=gplain},
+}
+
@misc{prng-back,
title = {Personal Communication},
author = {Adam Back},
Index: pynchon.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.tex,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -d -r1.2 -r1.3
--- pynchon.tex 26 Jan 2004 09:26:49 -0000 1.2
+++ pynchon.tex 26 Jan 2004 09:43:01 -0000 1.3
@@ -65,18 +65,18 @@
\subsection{Goals}
-While sender-anonymity systems such as Mixmaster have been available for
-public use for nearly a decade, there remains a need for a secure, robust
-system which will allow users to receive mail anonymously. The system
-should be of equivalent or greater security than the state of the art for
-forward message anonymity; should gracefully handle node failure without
-loss of mail; should be resistant to attack from rogue nodes; and should
-not require a complicated interface or special knowledge in order to be
-effectively employed by the end user.
+While sender-anonymity systems such as Mixmaster~\cite{mixmaster-spec}
+have been available for public use for nearly a decade, there remains a
+need for a secure, robust system which will allow users to receive mail
+anonymously. The system should be of equivalent or greater security than
+the state of the art for forward message anonymity; should gracefully
+handle node failure without loss of mail; should be resistant to attack
+from rogue nodes; and should not require a complicated interface or
+special knowledge in order to be effectively employed by the end user.
\subsection{Related Work}
-\subsubsection{Reply-blocks and return addresses}
+\subsubsection{Reply blocks and return addresses}
Chaum~\cite{chaum-mix} describes a method of using \emph{return addresses}
with forward-secure mix-nets. However, the system relies upon all selected
@@ -88,14 +88,14 @@
thus can construct robust remailer chains based on the current health of
the remailer network.}
-In addition to reliability issues, simple reply block systems suffer from
+In addition to reliability issues, simple reply-block systems suffer from
a pseudonym management perspective. Cypherpunk nym servers such as
-omega.c2.net~\cite{} and nym.alias.net~\cite{} implemented the concept of a
-central reply-block repository, allowing pseudonym-holders to receive
-messages delivered to a traditional email address. Unfortunately,
-reply-block systems based on the first generation implementation of
-Chaum's mix-nets (Type I remailers) allow multiple-use reply blocks.
-Attacks on multiple-use reply blocks are discussed
+alpha.c2.net~\cite{alpha-faq} and nym.alias.net~\cite{nym-alias-net}
+implemented the concept of a central reply-block repository, allowing
+pseudonym-holders to receive messages delivered to a traditional email
+address. Unfortunately, reply-block systems based on the first generation
+implementation of Chaum's mix-nets (Type I remailers) allow multiple-use
+reply blocks. Attacks on multiple-use reply blocks are discussed
in~\cite{remailer-attacks}. For a system to permit multiple-use reply
blocks, it must inherently risk replay-attacks~\cite{tcmay}. The Type I
anonymous remailer system suffers greatly because of this. Type II and
@@ -116,7 +116,7 @@
anonymity set, which is a significant security improvement over Type I.
However, since reply blocks are still being used, the reliability issues
remain.\footnote {If any given node in the pre-selected SURB is defunct at
-the time mail is set to be delivered, the mail will be lost.}
Reply block
+the time mail is set to be delivered, the mail will be lost.} Reply block
systems are also susceptible to intersection
attacks~\cite{disad-free-routes}. A global observer can collect data on
who is sending and receiving mail, and given enough time and data, will be
@@ -445,9 +445,8 @@
configuring new nyms, or addressing client warnings regarding abnormal
server behavior.
-We believe that such simplicity in the user interaction
-experience is a necessary component to the security of the
-system.
+We believe that such simplicity in the user interaction experience is a
+necessary component to the security of the system.
\section{Conclusions}
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/