From: Jim Hart <hart@chaos.bsu.edu>
To: wmo@digibd.com (Bill O’Hanlon)
Message Hash: f1da29abd1bb7e752cd087821ed5f87710d678cab12607abb6d708c5f5ec824d
Message ID: <199408172142.QAA19982@chaos.bsu.edu>
Reply To: <9408171615.AA29053@poe.digibd.com>
UTC Datetime: 1994-08-17 21:44:46 UTC
Raw Date: Wed, 17 Aug 94 14:44:46 PDT
From: Jim Hart <hart@chaos.bsu.edu>
Date: Wed, 17 Aug 94 14:44:46 PDT
To: wmo@digibd.com (Bill O'Hanlon)
Subject: Re: cfs & remailers
In-Reply-To: <9408171615.AA29053@poe.digibd.com>
Message-ID: <199408172142.QAA19982@chaos.bsu.edu>
MIME-Version: 1.0
Content-Type: text/plain
> The people whose security would be helped are those who do a single hop or
> send unencrypted mail through the remailer. People who use the remailer
> properly already have encrypted their mail.
But they'd still be in your logs, unless you immediately delete
or encrypt your logs. If you keep logs to help debug your
system snoop-proofing those logs is a good idea.
Also CFSing mail spools just for regular e-mail is a good idea,
to help enforce the ECPA. I hope this becomes standard policy
on the Internet.
(Of course, don't forget SecureDrive available for DOS).
Jim Hart
hart@chaos.bsu.edu
Return to August 1994
Return to “Matt Blaze <mab@crypto.com>”