1993-11-19 - The Republic of Desire (anonymous organ

Header Data

From: kone@courier1.sha.cornell.edu
To: <cypherpunks@toad.com>
Message Hash: ca51356c129becb6e1d164747de7e04059f37f19cd0be47af6be3eaafcdda085
Message ID: <2CEC4202@COURIER1.SHA.CORNELL.EDU>
Reply To: N/A
UTC Datetime: 1993-11-19 00:52:20 UTC
Raw Date: Thu, 18 Nov 93 16:52:20 PST

Raw message

From: kone@courier1.sha.cornell.edu
Date: Thu, 18 Nov 93 16:52:20 PST
To: <cypherpunks@toad.com>
Subject: The Republic of Desire (anonymous organ
Message-ID: <2CEC4202@COURIER1.SHA.CORNELL.EDU>
MIME-Version: 1.0
Content-Type: text/plain


<                               A
<                              / \
<                             B - C
<                            /     \
<                           D       G
<                          / \     / \
<                         E - F   H - I
<
 
Another problem in this set up is:  What if "B" is caught and put in
jail/killed?  How are "D" and company (including "J, K, L" and on) going to
stay in touch?  Some one posted that useing a "I am caught" key might help
cover the trail. I think it would cut down on the uptree pateren but might not
pass on info downtree.  Would a side to side contact help?
                            A
                           / \
                          B - C
                         /     \
                        D       G
                       / \     / \
                      E - F - H - I
How would one keep the cross over safe?  An "in case of loss of contact, use
PGP Key xxx?"
Ideas?
Will





Thread