[16144] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from

daemon@ATHENA.MIT.EDU (bear)
Sun Sep 12 00:00:22 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 11 Sep 2004 14:53:59 -0700 (PDT)
From: bear <bear@sonic.net>
To: Eugen Leitl <eugen@leitl.org>
Cc: Cryptography List <cryptography@metzdowd.com>
In-Reply-To: <20040910162028.GO1457@leitl.org>



On Fri, 10 Sep 2004, Eugen Leitl wrote:

>From: Joe Touch <touch@ISI.EDU>

>>To clarify, this is not really "anonymous" in the usual sense.
>
>It does not authenticate the endpoint's identification, other than "same
>place I had been talking to."
>

That's pseudonymity, not anonymity.


>There's no difference between having no "name" and having a name you
>cannot trust. I.e., I could travel under the name "anonymous" or "", or
>under the name "A. Smith". If you don't know whether I am actually A.
>Smith, the latter is identical to the former.

This is just plain not true.  When operating under a pseudonym,
you are making linkable acts - linkable to each other even if
not necessarily linkable to your own official identity.  Anonymous
actions or communications are those which cannot be linked to any
other no matter how hard someone tries.

We can expect the public to fail to grasp the distinction, but
on this list "anonymous" is a very strong claim.  Anonymity is
*HARD* to do, not something that results from failing to check
a credential.

				Bear

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post