1996-07-31 - FW: ANNOUNCEMENT: nym.alias.net enters beta testing (fwd)

Header Data

From: “Mr. Brandon W. Wheaton” <kbwheaton@patrol.i-way.co.uk>
To: “‘cypherpunks@toad.com>
Message Hash: 0a57cca415fb5f9d92d5c91667385f1d2b5d292b14f5ffdb094f8cc0cac12afb
Message ID: <01BB7EC3.EC5C1200@dynamic153.i-way.co.uk>
Reply To: N/A
UTC Datetime: 1996-07-31 11:59:10 UTC
Raw Date: Wed, 31 Jul 1996 19:59:10 +0800

Raw message

From: "Mr. Brandon W. Wheaton" <kbwheaton@patrol.i-way.co.uk>
Date: Wed, 31 Jul 1996 19:59:10 +0800
To: "'cypherpunks@toad.com>
Subject: FW: ANNOUNCEMENT: nym.alias.net enters beta testing (fwd)
Message-ID: <01BB7EC3.EC5C1200@dynamic153.i-way.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




----------
From: 	William Knowles[SMTP:erehwon@c2.org]
Sent: 	Tuesday, July 30, 1996 5:54 PM
To: 	dc-stuff
Subject: 	ANNOUNCEMENT: nym.alias.net enters beta testing (fwd)


---------- Forwarded message ----------
Date: Tue, 30 Jul 1996 19:40:36 -0400 (EDT)
From: lcs Remailer Administrator <mix-admin@nym.alias.net>
To: cypherpunks@toad.com, coderpunks@toad.com, remailer-operators@c2.org,
    mail2news@anon.lcs.mit.edu
Subject: ANNOUNCEMENT: nym.alias.net enters beta testing
Newsgroups: alt.privacy.anon-server

-----BEGIN PGP SIGNED MESSAGE-----

I'm pleased to announce that the nym.alias.net pseudonym server has
now entered the beta-testing phase, and seems quite stable.

Nym.alias.net offers several interesting features:

  * Public-Key encryption of all received mail.  Once mail has gone
    through nym.alias.net, no one can read it except you--even if you
    have been sending your mail to a newsgroup and your reply-block
    and remailers become compromised.

  * Support for multiple, probabilistically-weighted, reply blocks.
    These can be used for redundancy or to foil traffic analysis with
    decoys.

  * Replay detection.  This foils replay attacks, but can also be used
    for higher reliability if you send redundant copies of a message
    through different remailer chains.

  * An option to receive only fixed-length messages (by splitting up
    large messages and padding small ones with garbage).

  * An option to sign mail you send with the remailer's public key, so
    as to give some assurance of authenticity without having to
    publish your own PGP public key.

  * Support for finger [pending DNS approval].  You can choose to make
    your nym's PGP public key available to all who finger its E-mail
    address.  Right now you can test this by fingering at 18.26.0.252.

In addition, experimental nym.alias.net support for Premail is now
available (in the form of a patch to premail 0.44).  With this patch,
premail will store your nym's PGP key on encrypted keyrings.  This
allows you to publish a PGP key for your pseudonym without the danger
of your identity being revealed to someone with access to your main
PGP keyrings (or a backup copy of them).

To obtain more information about nym.alias.net, finger
<nymhelp@anon.lcs.mit.edu> or send mail to <help@nym.alias.net>.  To
get information about using premail with nym.alias.net, finger
<premail-info@anon.lcs.mit.edu> or send mail to
<premail-info@nym.alias.net>.

These documents are also available on the new nym.alias.net web page:
    http://www.cs.berkeley.edu/~raph/n.a.n.html

Please report all bugs to <admin@nym.alias.net>.  I'll also be glad to
consider feature requests, particularly from anyone interested in
developing any more client software.

Enjoy!

mix-admin@anon.lcs.mit.edu

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMf6dcUTBtHVi58fRAQE4NgP/SoKSqHxobEHuyWl6lXVAHgk9yqNS/WAD
jUfKYGodThr93kJZkmreyIHrWgbromJJlXo6MPq9KpZzIh85uHRzBPRSh293hfUo
ta8/sdZsW1+uoEkAs8JUWlwAEGo+bfmgRnFswf80pAPClpbGo52DAKyLKfdCaFps
kQ+4hoouUvo=
=qEWa
-----END PGP SIGNATURE-----








Thread