What Can I Find Out?
( by Monitoring Your Network re: Anubis Mailers )
What I See:
% Every N time periods, you contact an Anubis Mailer;
you and the mailer negotiate secure keys; X amount of encrypted traffic is observed & collected.
% Every N time periods, an Anubis Mailer contacts you;
you and the mailer negotiate secure keys; X amount of encrypted traffic is observed & collected.
% Every N time periods, you contact an Anubis Key Server;
you and the key server negotiate secure keys; X amount of encrypted traffic is observed & collected.
% Every N time periods, an Anubis Key Server contacts you;
you and the key server negotiate secure keys; X amount of encrypted traffic is observed & collected.
What I Don't See:
% Boundaries between irrelevant text and your private messages
% The header info of your private message
% The Anubis Mailer's challenge to you
% Any discernable direction to the traffic flow between
you and the mailer (ie, steady flow of encrypted text
obscures actual info flow)
% Which NYMs' keys you have queried the key server for
Look at Anubis Working Notes
Back to Anubis Home Page
Copyright 1994 M. Strata Rose, all rights reserved.