[Cryptography] Encryption and anonymity as top tools for images of child sexual abuse

David Honig dahonig at cox.net
Wed Oct 2 01:02:21 EDT 2019

> On September 29, 2019 at 9:50 AM John Young <jya at pipeline.com> wrote:
> NYTimes lengthy report on out of control growth of images of child 
> sexual abuse highlights encryption and anonymity as premier tools for 
> avoiding discovery, prosecution and shutdown.
> https://www.nytimes.com/interactive/2019/09/28/us/child-sex-abuse.html
> Silicon Valley giants are pilloried for failing to bar abusers.

Interestingly, either anonymity or encryption is sufficient to distribute naughty bits.  If they can't link them to you, or if they can't tell what you're getting, you have used anonymity or crypto-confidentiality correctly.

Anonymity is more than crypto ( == provides confidentiality, integrity, authentication ) because you need traffic-analysis resistance (routing confidentiality) which is harder.  If Tor was perfect you could exchange plaintext naughty bits though.

Of course they work best together: as anonymous as possible and encrypt all traffic (lest encrypted traffic draw suspicion, lest naughty plaintext interest traffic analysts).

Both of these annoy the herd-managers...

> _______________________________________________
> The cryptography mailing list
> cryptography at metzdowd.com
> https://www.metzdowd.com/mailman/listinfo/cryptography

More information about the cryptography mailing list