[118440] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Selective DoS Attacks: Remailer Vulnerabilities

daemon@ATHENA.MIT.EDU (palmer)
Tue Sep 28 06:32:54 1999

Message-Id: <199909281014.MAA05643@bbaer.muenster.de>
Date: Tue, 28 Sep 1999 12:10:37 +0200
To: RProcess <rprocess@nym.alias.net>, mail2news_nospam@anon.lcs.mit.edu,
        potatoware.reliable@listbot.com, potatoware@listbot.com,
        remailer-operators@anon.lcs.mit.edu
From: palmer <palmer@muenster.de>
Cc: cypherpunks@cyberpass.net
In-Reply-To: <19990924152012.14592.qmail@nym.alias.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Reply-To: palmer <palmer@muenster.de>

To: RProcess <rprocess@nym.alias.net>
Subject: Re: Selective DoS Attacks: Remailer Vulnerabilities
Cc: 

RProcess Thanks for an interesting analysis and a very scientific approach.
(And thanks for JBN)

I always wondered about those lost messages. It seems to me that we need a
few nym servers.

Here are some questions and I hope that RProcess or someone else might answer.

How much does the Nym software cost?
Where can I get it?
What does it run on ? System requirements? OS?
What is the minimum speed net connection?
What sort of security precautions would someone like me take to make sure
the server was physically safe from three-letter agency intrusion?

Georg Palmer (SYSOP PT List)



home help back first fref pref prev next nref lref last post