From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 610015ae429eaa99f33be8acda39a026e222954bac1b61fc6cbdb28c65752e6d
Message ID: <9402152008.AA23021@ah.com>
Reply To: <ghMFbZi00VBA8ICUc0@andrew.cmu.edu>
UTC Datetime: 1994-02-15 20:21:42 UTC
Raw Date: Tue, 15 Feb 94 12:21:42 PST
From: hughes@ah.com (Eric Hughes)
Date: Tue, 15 Feb 94 12:21:42 PST
To: cypherpunks@toad.com
Subject: Detweiler abuse again
In-Reply-To: <ghMFbZi00VBA8ICUc0@andrew.cmu.edu>
Message-ID: <9402152008.AA23021@ah.com>
MIME-Version: 1.0
Content-Type: text/plain
>It might be more effective if you bounced messages from detweiler back
>to him, CC: postmaster
Why even bounce? If you want to make the remailers do something with
unwanted mail, one could honor the remailing request, but not
anonymize it.
Eric
Return to February 1994
Return to “Matthew J Ghio <mg5n+@andrew.cmu.edu>”