From: kone@courier1.sha.cornell.edu
To: <cypherpunks@toad.com>
Message Hash: ca51356c129becb6e1d164747de7e04059f37f19cd0be47af6be3eaafcdda085
Message ID: <2CEC4202@COURIER1.SHA.CORNELL.EDU>
Reply To: N/A
UTC Datetime: 1993-11-19 00:52:20 UTC
Raw Date: Thu, 18 Nov 93 16:52:20 PST
From: kone@courier1.sha.cornell.edu
Date: Thu, 18 Nov 93 16:52:20 PST
To: <cypherpunks@toad.com>
Subject: The Republic of Desire (anonymous organ
Message-ID: <2CEC4202@COURIER1.SHA.CORNELL.EDU>
MIME-Version: 1.0
Content-Type: text/plain
< A
< / \
< B - C
< / \
< D G
< / \ / \
< E - F H - I
<
Another problem in this set up is: What if "B" is caught and put in
jail/killed? How are "D" and company (including "J, K, L" and on) going to
stay in touch? Some one posted that useing a "I am caught" key might help
cover the trail. I think it would cut down on the uptree pateren but might not
pass on info downtree. Would a side to side contact help?
A
/ \
B - C
/ \
D G
/ \ / \
E - F - H - I
How would one keep the cross over safe? An "in case of loss of contact, use
PGP Key xxx?"
Ideas?
Will
Return to November 1993
Return to “kone@courier1.sha.cornell.edu”
1993-11-19 (Thu, 18 Nov 93 16:52:20 PST) - The Republic of Desire (anonymous organ - kone@courier1.sha.cornell.edu