From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: df8e9241eaf11b0dc950df11ba1a289155dd082bcc52ad01c8a0cec87051b2e8
Message ID: <199411302344.PAA11847@largo.remailer.net>
Reply To: <9411302011.AA10944@prism.poly.edu>
UTC Datetime: 1994-11-30 22:45:28 UTC
Raw Date: Wed, 30 Nov 94 14:45:28 PST
From: eric@remailer.net (Eric Hughes)
Date: Wed, 30 Nov 94 14:45:28 PST
To: cypherpunks@toad.com
Subject: Re: "You aren't following the _rules_!"
In-Reply-To: <9411302011.AA10944@prism.poly.edu>
Message-ID: <199411302344.PAA11847@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain
From: rarachel@prism.poly.edu (Arsen Ray Arachelian)
I agree with Tim on this. There's no way I'm going to leave PGP on
poly's machines with the key right there for anyone who manages to
hack into photon or prism (and yes, it has happened) to set up a fake
pgp asking for the passphrase to my key.
Your key, singular? Keys are cheap! Everyone should have a bundle.
In addition, since I'm not planning on verifying the signatures at the
server, you are free to fake them. Of course, if you fake them,
you'll have to set up just about the same amount of software as if you
used real crypto. Since so much of deployment delay comes from bad
architecture, I consider setting up to fake a good thing.
Eric
Return to December 1994
Return to “werewolf@io.org (Mark Terka)”