<html><head></head><body><div><span data-mailaddress="mail@harveynewstrom.com" data-contactname="Harvey Newstrom" class="clickable"><span title="mail@harveynewstrom.com">Harvey Newstrom</span><span class="detail"> <mail@harveynewstrom.com></span></span> , 21/7/2014 3:26 PM:<br><blockquote class="mori" style="margin: 0px 0px 0px 0.8ex; border-left-width: 2px; border-left-color: blue; border-left-style: solid; padding-left: 1ex;">In theory, yes, this would be the perfect answer. However, the devil is in the details, as usual.</blockquote></div><div><br></div>Amen to that. A while ago I had a somewhat similar idea, and started reading up a bit on the issues. I soon realized that traffic analysis people are frighteningly smart, just like other cryptoanalysis people (or rather, they collective intelligence expressed in past known results - individuals are no doubt all over the place). Just because I couldn't see a way of cracking something didn't mean it was actually tough. Bruce Schneier is as always right with his dictum. <div><br></div><div>If I wanted to hide communications I would write letters. Now, once a few secret bits have been exchanged that way, one can do a lot...<br><div><div><br><div><blockquote class="mori" style="margin: 0px 0px 0px 0.8ex; border-left-width: 2px; border-left-color: blue; border-left-style: solid; padding-left: 1ex;"></blockquote></div><br>Anders Sandberg,
Future of Humanity Institute
Philosophy Faculty of Oxford University<br><br></div></div></div></body></html>