From: collins@newton.apple.com (Scott Collins)
To: xiaozhou@phoenix.Princeton.EDU
Message Hash: dc50daac79d13477408c1d066e964e78e4eddf3791e4856f6a05977350327c6d
Message ID: <9309181302.AA09384@newton.apple.com>
Reply To: N/A
UTC Datetime: 1993-09-18 13:06:53 UTC
Raw Date: Sat, 18 Sep 93 06:06:53 PDT
From: collins@newton.apple.com (Scott Collins)
Date: Sat, 18 Sep 93 06:06:53 PDT
To: xiaozhou@phoenix.Princeton.EDU
Subject: anon.penet.fi
Message-ID: <9309181302.AA09384@newton.apple.com>
MIME-Version: 1.0
Content-Type: text/plain
>What is your policy on chaining to anon.penet.fi?
Hmmm, it would be bad to post to anon.penet.fi through a remailer, as the
anon id assigned by penet would be associated with the remailer, _not_ with
you. Therefore, people who responded to the message would actually be
sending mail to the operator of the remailer that was the hop into penet.
Not to mention the fact if the remailer account were also a personal
account, and the operator was a client of penet, that his anon id could be
compromised in this way (if he was foolish enough not to have a password).
Therefore, it seems reasonable that remailers should refuse to mail into
penet, unless and until a non-anonymous reply to anonymous mail facility
becomes available there.
To the penet knowledgeable: is my understanding correct?
Scott Collins | "Few people realize what tremendous power there
| is in one of these things." -- Willy Wonka
......................|................................................
BUSINESS. voice:408.862.0540 fax:974.6094 collins@newton.apple.com
Apple Computer, Inc. 1 Infinite Loop, MS 301-2C Cupertino, CA 95014
.......................................................................
PERSONAL. voice/fax:408.257.1746 1024:669687 catalyst@netcom.com
Return to September 1993
Return to “hughes@ah.com (Eric Hughes)”