1993-02-23 - whistleblower newsgroup?

Header Data

From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: f4a5d9fe5204fce5567fe20782f2a48eb76fa79b9e0f1ca1bc69fc4eecb6ea5c
Message ID: <9302230117.AA18417@soda.berkeley.edu>
Reply To: <9302210334.AA02268@longs.lance.colostate.edu>
UTC Datetime: 1993-02-23 01:21:05 UTC
Raw Date: Mon, 22 Feb 93 17:21:05 PST

Raw message

From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Mon, 22 Feb 93 17:21:05 PST
To: cypherpunks@toad.com
Subject: whistleblower newsgroup?
In-Reply-To: <9302210334.AA02268@longs.lance.colostate.edu>
Message-ID: <9302230117.AA18417@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain

The moderator to alt.whistleblower, instead of a person's mail
address, could be a mail alias which invokes a header field stripper.
That way it would be impossible to post to the group with your
identity in the header.  Every posting anonymous!  Sort of like a
mathematical dual of alt.forgery.

I would also suggest a periodic posting explaining exactly how secure
that is.  (Proof against casual attack, but not against local or
global network monitoring.)

It seems easy enough.  I'd do it myself if I had root anywhere.  The
perl scripts for remailing would be easily hacked.  You could even
retain the automatic PGP decryption for the more informed, the more