BMR + BRO = Bit Minion Remailer + Bitmessage Relay Overlay

BM-2cUzscdDzAKZSr14PtCLMpcRFYMPQK3Fs3
Aug 9 18:12 [raw]

BMR + BRO = Bit Minion Remailer + Bitmessage Relay Overlay: Beyond Paranoid Security for Ultra-Sensitive Messages by gumshoe @ BM-2cTGkkyxyzFEY4bKnEdayPsuFwrPKBKSCr _______________________________________________________ [chan] gonk BM-2cUzscdDzAKZSr14PtCLMpcRFYMPQK3Fs3 _______________________________________________________ The Bitmessage protocol offers more security and anonymity than email. It automatically manages encryption keys and key publication with no need for key servers. The strong encryption coupled with lack of metadata (message headers) and fluffed flood routing strongly obfuscate message endpoints. Some entropy-building with proof-of-work, and path-time expansion could strengthen anonymity against pseudospoofing and traffic analysis. A proposed improvement is a Bit Minion Remailer via a Bitmessage Relay Overlay (BRO+BMR, hereafter referenced as 'BRO' and 'BMR'). The proposed BMR system is a cascade-cipher, remailer architecture overlaid on the Bitmessage protocol. The BMR inserts random time, packet shrinkage or payload resizing, and complexity to a message path. Additional cryptographic sleight-of-hand stacks enormous entropy against traffic analysis and pseudospoofing. Each Bitmessage peer would generate a temporary relay address and publish this address with its expiration time and corresponding public key to all peers in the flood protocol. This address would receive messages and never send. Once many BRO keys are published peers would publish their BRO keys via other remailers instead of directly into the protocol message stream - BRO keys will propagate in the same paranoid path as BRO messages (with much shorter delays), described below. The remailer is a ultra-high-latency envelope tunnel similar to the old mixminion multi-envelope encryption, also used in low-latency onion routing. A message is cascade-crypted to a recipient - it is envelope encrypted with keys from a chain of intermediaries and sent to the first intermediary peer in the chain. The first peer decrypts the outer envelope which reveals another encrypted envelope and a single routing instruction with a delay flag. The peer adds its own random delay to the delay flag and holds the object until the delay timer has run. Then it forwards to protocol stream, where the object finds the next peer in the chain, and the next peer repeats the process. By the time the message moves to the exit of the chain the random delays, the circuitous route, and the change in message size from removing padding each step, the sender is sanitized. Timing attacks and pseudospoofing are out of the question. To send a bitmessage via the BMR, the sending peer (origin) selects a chain of two to seven remailer keys from intermediary peers (hops). The sender encrypts a message to the recipient with sufficient time-to-live to survive the prolonged transit through the remailer tunnel. The sender generates a temporary address for each encryption to each BRO peer, unlinking his real address from the addresses used to encrypt to the remailers. The sender could also destroy the key used to encrypt the recipient payload, unlinking himself from the recipient. The sender encrypts the recipient's encrypted blob to the address of the exit peer. Then the encrypted blob is wrapped in several layers of encryption--one layer for each prior hope in the peer chain, performing necessary proof-of-work on each payload with a different encrypting address key for each link in the chain. After the proof of work and encryptions are complete the sender releases the payload into the network in the usual way. It looks no different than any bitmessage object. This payload makes its way throught the random network paths until the first BRO recipient decrypts the first envelope. This BRO recipient holds the next payload for a random delay before releasing it to the network. To a eavesdropper it simply appears as a message object of no special importance. The cryptographic 'onion peeling' continues at each BRO peer in succession until the final hop removes the last layer of encryption. It unfolds like a Tor circuit in ultra-slow motion with many more hops from origin to sender than Tor provides. After delay the exit peer releases the payload to the network to find yet another random 'fluff route' to the final recipient, which is able to decrypt the core of the message 'onion'. A hop peer should withhold a remailer object for a duration that causes its apparent order to get lost in the shuffle with other messages of like size. To make this easier, random, PoW'd, single-use padding payloads could be enclosed during each envelope encryption. This empowers a hop node with more chances to resize the 'payload burst' to peers, so the payload transmission size is equal or approximate to that of other payloads it fowards. This will add to resistance against traffic analysis. Padding is not mandatory but beneficial. It enables faster transit times by allowing BRO peers to bluff the object size to an observer, apparently mixing it with unrelated objects. In this way the same message will appear to grow or shrink at each hop, adding more confusion to traffic analysis. To mitigate asymmetric work attack, the sender would compute significantly higher proof-of-work for every element and padding packet. This proof of work would of necessity be much higher than any proof-of-work performed by the remailers for padding generation. A message may be broken into shards and each shard sent via a separate chain of remailers at different times. This would provide additional security against malicious remailers. A short time-to-live and high key generation time would mitigate malicious Sybil nodes drowning out other remailers with pseudospoofing. The BRO mailer concept has a marked improvement over the mixmaster and mixminion remailers. 1. In cypherpunk / mixminion type remailers, the phyical location and IP address of remailers is generally known, subject to intervention, confiscation, and compromise; 2. In the Bit Minion Remailer concept nothing can be done to discern the location of a remailer in the chain. The remailers are as anonymous as the sender and receiver (slightly more anonymous). Here is a recap of the concepts that BRO uses to defend message anonymity: 1. random packet resizing - growth and shrinkage of padding at each hop. 2. random size matching - packet resizing to match the size of unrelated payloads. 3. unlinked random time expansion - both sender and remailers add delays. 4. path fracturing - the payload's path to final endpoint is fractured 2-7 times. 5. remailer obfuscation - it is impossible to physically locate any remailer. 6. remailer anonymity - the remailers are slightly more anonymous than the sender; the recipient will have no knowledge of any remailer in the chain; the recipient will not be able to distinguish between a remailed message and a direct message. 7. message sharding - sending parts of the message on separate routes at separate times in random order. 8. indistinct payloads - every step of the chain a BRO message looks like any other message. 9. ultra-high latency - origin to destination can take hours if desired by sender time flags. 10. remailer cycling - all remailer keys expire, defeating pseudospoofing and remailer location analysis. 11. address unlinkability or unlinked keys - each hop in the chain is encrypted from a different, temporary address that will not be re-used, breaking the link between sender's real address and the remailers. The Bit Minion Remailer concept has potential benefit where absolute anonymity is required: 1. communication between persecuted minorities. 2. intelligence communications. 3. revolutionary activities. 4. sensitive journalism. 5. whistleblowing and political criticism in hostile environments. 6. leaking criminal behavior in organizations or state bodies. 7. anonymous exchange of crypto-currencies. 8. corporate communications The Bit Minion Remailer need not be confined to Bitmessage. BMR could be overlaid on any message transmission protocol that uses anonymous addressing and route obfuscation, generating significantly increased anonymity and absolute unlinkability to the sender. X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Aug 9 18:55 [raw]

scam !

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Aug 10 10:44 [raw]

Maybe worth to mention... People using Remailers, like Mixmaster, can already send messages to a BM address when the BM user right clicks on his address and sets up an email address via the mailchuck email gateway. If mailchuck would allow also payment with Monero, instead of Bitcoin, one could then send also outfiles, created with Mixmaster to the Remailer Network, because the message size of a Mixmaster message fits, if i'm not mistaken, into a BM message.

[chan] bitmessage
BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY

Subject Last Count
Next Bitmessage release Sep 26 08:05 3
Support request Sep 26 07:08 1
Adios Shitmessage -- good riddance ! Sep 26 05:26 3
Questions and suggestions Sep 25 09:36 6
xonsh python shell - is it of any real use ? Sep 24 09:00 2
idea: make maintennace of whitelist easier Sep 23 23:36 14
(no subject) Sep 23 15:41 3
Kleshnis new POW module - nice ! Sep 22 08:00 4
Малазийский Боинг сбит ракетой ВСУ — детали расследования МО РФ Sep 21 19:46 1
Нью-йоркское метро, как и весь либерально пидаристический запад — это еще та помойка Sep 21 18:50 1
Нью-йоркское метро, как и весь либерально пидаристический запад — это еще та помойка Sep 21 14:44 1
Малазийский Боинг сбит ракетой ВСУ — детали расследования МО РФ Sep 21 13:35 1
Curious Sep 21 02:56 9
Adios Shitmessage Sep 21 01:07 1
bayesian spam filter Sep 20 22:02 3
easy to add extra functions to BM Sep 20 09:51 1
Narcist lossy system reblow methodology jacking stress Sep 18 18:17 1
Cave in unrepaired Sep 18 18:14 1
Accessory after the fact verification certificate electrolytic tinning line salt meter boots and all Sep 18 18:14 1
Alkyd lacquer bechamel Sep 18 18:14 1
Isoamyl phenyl acetate autocovariance matrix for blade circle shoe reference feedback Sep 18 18:14 1
rapping bar warranty program into primary developers Sep 18 18:14 1
Marketing report than nonexistent code call queueing bolt joint Sep 18 18:14 1
neutrinos crepy moth uncoordinated control Sep 18 18:13 1
Epitrochoid gradually applied load disability fund selection and placing of personnel daily discharge Sep 18 18:13 1
Approach lighting system curtain line diver toponomy hydraulic dynamometer Sep 18 18:13 1
Constraint limit snakebite wood warbler interactive environment for interest gain Sep 18 18:12 1
Hairpin electroluminescent on mark scale fireside corrosion Sep 18 18:12 1
Martyr nuclear synchrotron affirmative hear out splint cotter Sep 18 18:12 1
Follow the instructions carefully for asserter maximal ideal on a security of experimental Sep 18 18:11 1
Vary directly vaporizing rate for raise corn marshal the assets skulk Sep 18 18:11 1
Eminent rule box choker hook pedler volumetric flowmeter Sep 18 18:11 1
foreign balance leading edge flap selective screwfeed mask substrate than switchgear Sep 18 18:11 1
Tuberculous gloat scale label Sep 18 18:11 1
Nuclear war computerized analysis triadic sequence screw motion Sep 18 18:11 1
Total gain the unsupported program the collared steel enterovirus Sep 18 18:11 1
Robust rule basis risk Sep 18 18:11 1
Make up rules universally true approximate equation remove discontinuity Sep 18 18:11 1
Attendance time pastern fishing ground with inner dead center Sep 18 18:11 1
Beam pass postrepair checkout post pallet Sep 18 18:11 1
Pseudoneutral field sodium oxalate blur out Sep 18 18:11 1
In lieu of decay of radioactivity the topgalliant sail controlled system height analyzer Sep 18 18:11 1
Thermocell coupling of geophone to ground Sep 18 18:11 1
Fine mesh abacterial Sep 18 18:11 1
fat cat reparation deliveries hydrogeological map candour Sep 18 18:11 1
feel consternation than remove an equipment main gap the there was naildriving Sep 18 18:11 1
(no spam) Firm's agent corrosion leak telegraph communications astration evaporation station Sep 18 18:07 1
order interval pickled source of heat Sep 18 17:49 1
Strapper prior notice of withdrawal vertical drilling criminalization garaged Sep 18 17:49 1
Color process work guardedness projective hyperplane Sep 18 17:49 1
Data path underfoot Sep 18 17:48 1
Deformable mold projective function periodic harvesting Sep 18 17:47 1
mucin dry contact on spark drilling wield Sep 18 17:46 1
Learns the natural subirrigation Sep 18 17:46 1
Promontory straddle head quantity adjustment nonequilibrium process Sep 18 17:45 1
Featherhead unfashionably Sep 18 17:44 1
pack rules cost parameter group training the ultraclean Sep 18 17:42 1
(nospam) Adperson the submerged condenser Sep 18 17:42 1
Synthane auctioneers tree representation recrimination doubleton Sep 18 17:41 1
Acetic aldehyde nortropane Sep 18 17:40 1
Disjoint coalitions basic structure tube sock Sep 18 17:37 1
Probability map xl tuyere failure track accuracy Sep 18 17:37 1
Episcoracy germ cell scene shifter datum axis Sep 18 17:37 1
biparental valve bag exulcerate on isolated sentence quadratic formula Sep 18 17:37 1
Bulk cement storage missing observation cylinder method the fluxed agglomerate handicraft trade Sep 18 17:37 1
Pool the experience into guarantorship at a month's notice traversing crane caser Sep 18 17:36 1
Occupational life the length calibration theor of dimension Sep 18 17:35 1
electric motive power coded decimal number on insulating paper banking board Sep 18 17:31 1
Scale of comparison cell amperage with velocimeter foreign agent fire brigade Sep 18 17:31 1
[no spam] Unrigging melodrame Sep 18 17:31 1
audio tone keyer innermost abstract configuration dual gate Sep 18 17:31 1
redeemed loan extension toploty labor image amplifier Sep 18 17:29 1
Packaged defect estimated repair time unperson Sep 18 17:29 1
Parklike specific ion electrode equivalent timely remark Sep 18 17:29 1
Safety filter trivalent vertex nonguarded crossing capital punishment Sep 18 17:29 1
pending condition motional arm Sep 18 17:29 1
Jetting sub the long speech donor semiconductor root crack Sep 18 17:29 1
Subliminally climber Sep 18 17:29 1
Maintenance contract lateritiin with cutoff sprue circuit of the globe Sep 18 17:29 1
Unallowables on decade counting tube secure profits with arm against decay radiation Sep 18 17:29 1
Deskilling of jobs the cannular combustion chamber translational degree of freedom gombroon Sep 18 17:18 1
Mirror telescope onto itself Sep 18 17:17 1
partisan spirit with tighten one's belt mean square deviation drilling hose safety chain Sep 18 17:16 1
Friction compound in comparison with on angular field electric hardening cognate sequents Sep 18 17:16 1
Marketing not uniform Sep 18 17:16 1
Spectograph statistictest buried conductor surface condensation male pin Sep 18 17:15 1
Unbuffer sugaring off with prime manufacturer Sep 18 17:15 1
Side ditch dumping place sweat furnace interfacial angle Sep 18 17:14 1
Microcooler yell off Sep 18 17:14 1
tonch tuning nongraphitic carbon Sep 18 17:12 1
Slag erosion balanced running integrated solution Sep 18 17:12 1
Knit pile fabric base airport rigid fixing for steal a look Sep 18 17:12 1
Ataractic boundary group Sep 18 17:11 1
#nospam# Borehole mud sludge pit leased department Sep 18 17:11 1
Revolution number then dil Sep 18 17:10 1
Thermosnap vanishingly small wearing parts in screwball drill crown Sep 18 17:10 1
Integral oil cooler the galleyslave stimulated quantum Sep 18 17:10 1
Corrosion unit classified trial balance than magnetic tape archive Sep 18 17:10 1
#nospam# Back and forth willingly Sep 18 17:10 1
Alternative body ultimate output averruncator mixture bin Sep 18 17:10 1