1994-11-30 - Re: “You aren’t following the rules!”

Header Data

From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: df8e9241eaf11b0dc950df11ba1a289155dd082bcc52ad01c8a0cec87051b2e8
Message ID: <199411302344.PAA11847@largo.remailer.net>
Reply To: <9411302011.AA10944@prism.poly.edu>
UTC Datetime: 1994-11-30 22:45:28 UTC
Raw Date: Wed, 30 Nov 94 14:45:28 PST

Raw message

From: eric@remailer.net (Eric Hughes)
Date: Wed, 30 Nov 94 14:45:28 PST
To: cypherpunks@toad.com
Subject: Re: "You aren't following the _rules_!"
In-Reply-To: <9411302011.AA10944@prism.poly.edu>
Message-ID: <199411302344.PAA11847@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain


   From: rarachel@prism.poly.edu (Arsen Ray Arachelian)

   I agree with Tim on this.  There's no way I'm going to leave PGP on
   poly's machines with the key right there for anyone who manages to
   hack into photon or prism (and yes, it has happened) to set up a fake
   pgp asking for the passphrase to my key.

Your key, singular?  Keys are cheap!  Everyone should have a bundle.

In addition, since I'm not planning on verifying the signatures at the
server, you are free to fake them.  Of course, if you fake them,
you'll have to set up just about the same amount of software as if you
used real crypto.  Since so much of deployment delay comes from bad
architecture, I consider setting up to fake a good thing.

Eric





Thread