[118440] in Cypherpunks
Re: Selective DoS Attacks: Remailer Vulnerabilities
daemon@ATHENA.MIT.EDU (palmer)
Tue Sep 28 06:32:54 1999
Message-Id: <199909281014.MAA05643@bbaer.muenster.de>
Date: Tue, 28 Sep 1999 12:10:37 +0200
To: RProcess <rprocess@nym.alias.net>, mail2news_nospam@anon.lcs.mit.edu,
potatoware.reliable@listbot.com, potatoware@listbot.com,
remailer-operators@anon.lcs.mit.edu
From: palmer <palmer@muenster.de>
Cc: cypherpunks@cyberpass.net
In-Reply-To: <19990924152012.14592.qmail@nym.alias.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Reply-To: palmer <palmer@muenster.de>
To: RProcess <rprocess@nym.alias.net>
Subject: Re: Selective DoS Attacks: Remailer Vulnerabilities
Cc:
RProcess Thanks for an interesting analysis and a very scientific approach.
(And thanks for JBN)
I always wondered about those lost messages. It seems to me that we need a
few nym servers.
Here are some questions and I hope that RProcess or someone else might answer.
How much does the Nym software cost?
Where can I get it?
What does it run on ? System requirements? OS?
What is the minimum speed net connection?
What sort of security precautions would someone like me take to make sure
the server was physically safe from three-letter agency intrusion?
Georg Palmer (SYSOP PT List)