Anubis-Monitoring-Slide-4
			What Can I Find Out?
  	( by Monitoring Your Network re: Anubis Mailers )


What I See:  

	%  Every N time periods, you contact an Anubis Mailer; 	
		you and the mailer negotiate secure keys;					         X amount of encrypted traffic is observed & collected.

	%  Every N time periods, an Anubis Mailer contacts you;	
		you and the mailer negotiate secure keys;					         X amount of encrypted traffic is observed & collected.
	
	%  Every N time periods, you contact an Anubis Key Server;	
		you and the key server negotiate secure keys;					         X amount of encrypted traffic is observed & collected.

	%  Every N time periods, an Anubis Key Server contacts you;	
		you and the key server negotiate secure keys;					         X amount of encrypted traffic is observed & collected.

		  


What I Don't See:

	%  Boundaries between irrelevant text and your private messages

	%  The header info of your private message

	%  The Anubis Mailer's challenge to you

	%  Any discernable direction to the traffic flow between 
	   you and the mailer (ie, steady flow of encrypted text 
	   obscures actual info flow)

	%  Which NYMs' keys you have queried the key server for
		


Look at Anubis Working Notes

Back to Anubis Home Page

Copyright 1994 M. Strata Rose, all rights reserved.