1997-11-04 - PGP 5.0: Keyservers

Header Data

From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
To: cypherpunks@Algebra.COM
Message Hash: 66fcd8d28c6b9e9534d31eea569f56af86b4436f42fc9b983cc032f5b400410e
Message ID: <19971104042001.4745.qmail@nym.alias.net>
Reply To: N/A
UTC Datetime: 1997-11-04 04:26:04 UTC
Raw Date: Tue, 4 Nov 1997 12:26:04 +0800

Raw message

From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 4 Nov 1997 12:26:04 +0800
To: cypherpunks@Algebra.COM
Subject: PGP 5.0: Keyservers
Message-ID: <19971104042001.4745.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain



Out of curiosity, what protection is there for PGP 5.x users submitting keys
to the keyservers? Would it not be trivial for somebody to see what dialup
SLIP link a key is coming from and tie that key to the person submitting it?

That isn't a problem for personal keys, but it is a big problem for
psuedonyms. Is there some kind of mechanism in place for submitting such
keys via anonymous remailers? 

This might already have been covered by other Cypherpunks or the PGP folks.

ParanoiaMonger






Thread