1996-12-31 - premail.

Header Data

From: nobody@replay.com (Anonymous)
To: cypherpunks@toad.com
Message Hash: ff4e7d118ed0906363b3f56c7997f57f2928affb05114a19eb0583e139c03e0a
Message ID: <199612310527.GAA12868@basement.replay.com>
Reply To: N/A
UTC Datetime: 1996-12-31 05:28:05 UTC
Raw Date: Mon, 30 Dec 1996 21:28:05 -0800 (PST)

Raw message

From: nobody@replay.com (Anonymous)
Date: Mon, 30 Dec 1996 21:28:05 -0800 (PST)
To: cypherpunks@toad.com
Subject: premail.
Message-ID: <199612310527.GAA12868@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain


A scenario:

1) The spooks put a bug (named Eve) on the link between
kiwi.cs.berkeley.edu and the Internet.

   Whenever kiwi.cs.berkeley.edu sents out the pubring.pgp Eve intercepts
it and replaces it with a file of the spooks' choosing. This file will
selectively replace the public pgp keys of some of the remailers (say exon)
in pubring.pgp with keys to which the spooks know the private key.

2) A similar bug is put on the link between the exon remailer and the
internet. All email to exon is intercepted, and if found to be encrypted
with the spooks' PGP key, it is decrypted, saved, re-encrypted with exon's
real PGP key and sent on.

It is only a scenario. I am still using premail to send this.





Thread