Delivery-Date: Fri, 29 May 2015 18:48:47 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 34F451E1271;
	Fri, 29 May 2015 18:48:46 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 6B22834B28;
	Fri, 29 May 2015 22:48:38 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id EE73434824
 for <tor-talk@lists.torproject.org>; Fri, 29 May 2015 22:48:34 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id tJBxQo-L293K for <tor-talk@lists.torproject.org>;
 Fri, 29 May 2015 22:48:34 +0000 (UTC)
Received: from mail.confidantmail.org (mail.confidantmail.org [54.213.166.118])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id C92F7343A2
 for <tor-talk@lists.torproject.org>; Fri, 29 May 2015 22:48:34 +0000 (UTC)
Received: from [192.168.1.174] (rrcs-24-43-0-6.west.biz.rr.com [24.43.0.6])
 (Authenticated sender: mike)
 by mail.confidantmail.org (Postfix) with ESMTPSA id 999EEA226E
 for <tor-talk@lists.torproject.org>; Fri, 29 May 2015 22:48:31 +0000 (UTC)
Message-ID: <5568ECB5.4090809@confidantmail.org>
Date: Fri, 29 May 2015 15:48:21 -0700
From: Mike Ingle <mike@confidantmail.org>
User-Agent: Thunderbird 2.0.0.22 (Windows/20090605)
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <CAD2Ti2-qdymrnM-nHqP2sVBYP=notY6sW54dQ1to-KTbkTEY4A@mail.gmail.com>
 <555E2BFC.6000709@rawbw.com> <20150526233633.GA1790@lo.psyced.org>
 <5565198C.2000701@yahoo.com> <55651A22.4020501@confidantmail.org>
 <5568E0B0.3020105@yahoo.com>
In-Reply-To: <5568E0B0.3020105@yahoo.com>
Subject: Re: [tor-talk] Mailpile SMTorP [ref: nexgen P2P email]
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

I'm not trying to offend anyone. I was talking about broadcast 
everything systems in general.
Bitmessage is a fine implementation of the broadcast everything 
paradigm. I'm looking for an
intermediate between broadcast everything and SMTP-over-Tor.

My proposal is essentially: servers form a DHT. Users store their keys 
in the DHT by key id.
The key record also has some additional metadata including where the 
user wants to receive
messages. For short messages, the message is stored in the DHT by its 
hash. Each user also
has a few hash values they check to get message announcements. Senders 
post an announcement
to one of those values at random. Message announcements point to message 
data.

People who want to be anonymous can connect to any server over Tor, and 
post or request
hash values to/from the DHT. An attacker would have to have Tor 
compromised and also have
that particular server compromised to break someone's anonymity. It's 
not as anonymous as
broadcast everything, but it's better than SMTP over Tor or webmail over 
Tor.

Using the DHT it is also possible to look up a user knowing only his 
email address, and then
verify the key id. And people who want to exchange big files can get an 
account on a server,
in which case the data is stored in 8MB blocks with no maximum size. 
People who need to
distribute big files pay for the server capacity, and small anonymous 
messages free-ride, with
a proof of work to prevent spamming.

Mike

> >This is pretty similar to receiving a Usenet feed in the old days, and
> >downloading all the messages so as to receive a few encrypted ones. That
> >makes for the best recipient privacy, at the cost of bandwidth. From
> >what I can tell, Bitmessage basically automates that process.
>
> No, not "Bitmessage", but "the specific use-case for a feature that I
> happen to understand and mentioned on this list."
>
> > If it
> >moved beyond the Darknet Markets crowd, success would kill it or at
> >least require compromising the broadcast-everything rule.
>
> I'll just ask you straight up-- are you talking about 
> broadcast-everything
> systems in general, or are you giving an assessment of Bitmessage's 
> design and
> implementation based on (at least) a thorough reading of the 5 page 
> whitepaper?
>
> (Confidential to cryptography list lurkers: IMO we have plenty of Ben 
> Lauries
> at this point, and could use a lot more Hal Finneys. :)
>
> -Jonathan

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

