From: Jim Pinson <jpinson@fcdarwin.org.ec>
To: cypherpunks@toad.com
Message Hash: 88ef27a9543f2f294b4a8cdb61bfea133537c5703fc87fbabbd116b6f9d49aaf
Message ID: <Pine.3.89.9411221309.A1007-0100000@fcdarwin.org.ec>
Reply To: N/A
UTC Datetime: 1994-11-22 20:48:49 UTC
Raw Date: Tue, 22 Nov 94 12:48:49 PST
From: Jim Pinson <jpinson@fcdarwin.org.ec>
Date: Tue, 22 Nov 94 12:48:49 PST
To: cypherpunks@toad.com
Subject: New remailer concept.
Message-ID: <Pine.3.89.9411221309.A1007-0100000@fcdarwin.org.ec>
MIME-Version: 1.0
Content-Type: text/plain
It occurs to me that most people have more to fear from their
neighbors, than they do from the powerful TLA's. Knowing that
you are hunting for a new job is not important to the world at
large, but could be embarrassing if your current employer found
out. Likewise, the people most interested in knowing about that
sex list you subscribe to are your coworkers.
The answer of course is encryption, but that is a problem when
you are writing to your, well... , "crypto challenged"
friends. Also, two way encrypted messages to most discussion
lists is not possible (to my knowledge).
To address these problems I suggest the creation of "crypto
remailers". They would work like this:
You subscribe to the remailer by sending a request including the
account name you wish. This could be either a real name
(jpinson) or a pseudonym (lizard). You would also include in
the subscription request a copy of your public key.
Assuming there are no name collisions with existing users, you
would get back a message of acceptance, and a copy of the
remailers public key.
To use the remailer, you would create a message containing as the
first line a "request remail to: USERNAME" , followed by your message.
You then encrypt the message with the remailers public key and
send it to the "remail" account at the remailer.
The remailer then decodes the message you sent, and sends it to
its destination as plain text. It sets the "from" field to your
account name on the remailer.
The recipient of your message can then reply to your remail
account in plain text, with no need for any "remail to " commands
or special processing.
A .forward pipe on your remailer account would run a Perl script
to encode the message to you with your public key, and send it to
your real address. (for security it could set the "from" field
to something other than your remail account name)
The advantage is that you have total protection at your end.
All mail to and from the remail account is encrypted.
You could now subscribe to lists, and receive mail from lists,
without your local administrator knowing anything about them.
This last feature could be useful for students at universities
that limit access.
Is there anything like this out there already?
Jim Pinson Charles Darwin Research Station, Galapagos
Return to November 1994
Return to “sameer <sameer@c2.org>”