1993-10-29 - Re: ID of anonymous posters via word analysis?

Header Data

From: an41418@anon.penet.fi (wonderer)
To: cypherpunks@toad.com
Message Hash: 15fb5228ca4267513bf2b86b908516f522e48f186153b263cd145ad70343b3f5
Message ID: <9310292305.AA22193@anon.penet.fi>
Reply To: N/A
UTC Datetime: 1993-10-29 23:09:07 UTC
Raw Date: Fri, 29 Oct 93 16:09:07 PDT

Raw message

From: an41418@anon.penet.fi (wonderer)
Date: Fri, 29 Oct 93 16:09:07 PDT
To: cypherpunks@toad.com
Subject: Re: ID of anonymous posters via word analysis?
Message-ID: <9310292305.AA22193@anon.penet.fi>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

I don't see anything wrong or unethical about using software.
It is true that the Nazis used gas against the Jews in
WW II, so are you not going to use gas? I hope this doesn't
sound insensitive, but part of studying anonymity and
the pseudonymous experience is finding out what sort of
techniques can be used to discover someone's nym. I pointed
one out earlier - watching for double postings, one by nym,
the other by actual identity.

If studying writing patterns is a viable method for
discovering the true identity of a nym, then by all means
try it. If someone were to discover my identity, I would
use it as a learning experience. I'm going to be as
careful as possible, but I would not advocate ignoring
software if it exists, no matter what its historical
significance.

Wonderer

-----BEGIN PGP SIGNATURE-----
Version: 2.3

iQBVAgUBLNF+hh1kTJuroDD9AQG96QIAo5JEYTSOAwaAdFDs9AOEbbq27Uho3b8r
T1corhWKdZVmESMYLKTCaIcxlkABUcCcZfyCS8bLlud7P4HlCSq3dw==
=RKfn
-----END PGP SIGNATURE-----
-------------------------------------------------------------------------
To find out more about the anon service, send mail to help@anon.penet.fi.
Due to the double-blind, any mail replies to this message will be anonymized,
and an anonymous id will be allocated automatically. You have been warned.
Please report any problems, inappropriate use etc. to admin@anon.penet.fi.





Thread