1993-03-01 - Re: anon user on cypherpunks list

Header Data

From: Johan Helsingius <julf@penet.FI>
To: Eli Brandt <ebrandt@jarthur.claremont.edu>
Message Hash: 902a009de2653fe8de4972e619cb65f049a1209157f4d17d0ad606e642c0f27a
Message ID: <9303011328.aa09601@penet.penet.FI>
Reply To: <9303010023.AA07585@toad.com>
UTC Datetime: 1993-03-01 12:25:47 UTC
Raw Date: Mon, 1 Mar 93 04:25:47 PST

Raw message

From: Johan Helsingius <julf@penet.FI>
Date: Mon, 1 Mar 93 04:25:47 PST
To: Eli Brandt <ebrandt@jarthur.claremont.edu>
Subject: Re: anon user on cypherpunks list
In-Reply-To: <9303010023.AA07585@toad.com>
Message-ID: <9303011328.aa09601@penet.penet.FI>
MIME-Version: 1.0
Content-Type: text/plain

> > For every reason you might want a pseudonym in the first place, you
> > might also want a "pseudonym from your pseudonym," especially if you
> > use it a lot.
> A specific example: I am presently running a survey of drug prices,
> and suggested that respondents might wish to reply through penet.
> Unfortunately, I realized that I could not respond to these messages
> without blowing my penet pseudonym.  Fortunately, I had never
> actually used it, so I could safely "blow it".  At present, if I
> need another penet pseudonym, I guess I'll create it through mail
> games.  But IWBNI there were a built-in way to do this --
> particularly for those who aren't able to hack mailers, who are the
> ones who really need a service such a penet in the first place.

Agree. And I *think* I have come up with a way to handle it "safely".
Will do a test implementation RSN.