1996-05-28 - Re: Quickremail v1.0b

Header Data

From: Matts Kallioniemi <matts@pi.se>
To: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
Message Hash: f70939e7ff9d5f1c125cb8f909ed602aab4fe29a4f4f813a4a36e018c28464d8
Message ID: <2.2.32.19960528100951.0038fbb4@mail.pi.se>
Reply To: N/A
UTC Datetime: 1996-05-28 14:32:41 UTC
Raw Date: Tue, 28 May 1996 22:32:41 +0800

Raw message

From: Matts Kallioniemi <matts@pi.se>
Date: Tue, 28 May 1996 22:32:41 +0800
To: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Subject: Re: Quickremail v1.0b
Message-ID: <2.2.32.19960528100951.0038fbb4@mail.pi.se>
MIME-Version: 1.0
Content-Type: text/plain


At 17:28 1996-05-27 EDT, E. ALLEN SMITH wrote:
>I'm planning on starting up a remailer, probably on Lance's machine (to
>take advantage of his expertise) sometime this summer. I do want to get PGP
>for the VAX before then, and the MIT site doesn't appear to have this code.

Why would anyone set up a remailer at Lance's (or Sameer's) machine?
They have remailers running already. If the thugs break root and obtain
one remailer key from a machine, they probably get all the keys on that
machine, compromising all the remailers in one single attack. Or am I
missing something? Is there any benefit of multiple remailers on a machine
where root is running his own remailer?

Matts

ps.
The vax pgp is available at
ftp://ftp.net-connect.net/pub/cypherpunks/pgp/vaxpgp262.tar.Z






Thread