1994-07-21 - no subject (file transmission)

Header Data

From: Anonymous User <nobody@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: bb92ecd162046136db52680ad1dbcc51170d1ccf83fa0f91abb6fd4e472c3f4e
Message ID: <199407210716.AAA03815@soda.berkeley.edu>
Reply To: N/A
UTC Datetime: 1994-07-21 07:16:49 UTC
Raw Date: Thu, 21 Jul 94 00:16:49 PDT

Raw message

From: Anonymous User <nobody@soda.berkeley.edu>
Date: Thu, 21 Jul 94 00:16:49 PDT
To: cypherpunks@toad.com
Subject: no subject (file transmission)
Message-ID: <199407210716.AAA03815@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

This is a dumb question, but where can I get info on how key
escro works?

No, I am not championing clipper, just curious on this idea of
key escrow.

BTW:  here is my PGP key, so that a tentacle or minion of SOMEBODY
does not use my identity. ;-)

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6

mQCNAi4uAxoAAAEEAODNXIRJh7tu9MwBblaTxT2i1TRRn+HSxaVJ3IER4Yyl7aei
4pSt1anvxf0ZW+5tSdN6MFjUbYsioji8+DmXbnFoTTNtTIu5gE9TNYmF1pjpi8as
HlvinbVbOUtZp8KENhfHOWkVtTqRmapTxXH0Ji6yxImo8jsb204+28KmzpWFAAUX
tAlDeWJlcmR1bmU=
=l+xa
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQCVAgUBLi4HQk4+28KmzpWFAQF49gP+Ms9+Hz71enBuA5Z4OCwbjcqcCCuyoIE4
AHqAKZeBPukqUdtrBZH3j8bdVP8i+8UKack3EnxfJXz+T8b010J52bIpP0deMw+l
vtYXB1dSUIamIL9W7HP+V6ghbk1DKgyFmUTk0qWe0jad5RODW3IVquTCB6jMDSHX
iwrzqiquY1U=
=iaDb
-----END PGP SIGNATURE-----

------------
To respond to the sender of this message, send mail to
remailer@soda.berkeley.edu, starting your message with
the following 8 lines:
::
Response-Key: ideaclipper

====Encrypted-Sender-Begin====
MI@```%ES^P;+]AB?X9TW6\8WR:RP&2$59PH9(D5\+J5R.&*'OJ%/+7CSM):,
MHR*%41?,$L`(2]NQW&5EF7*TTG"8=]"T<J0;JUR9_(()X7@4#8?5L+O$$:,\
$P#BH5P``
====Encrypted-Sender-End====





Thread