1994-12-02 - Re: Mighty morphing power cypherpunks

Header Data

From: jamesd@netcom.com (James A. Donald)
To: rfb@lehman.com
Message Hash: f962ad616a4376542e775221cb8be0fba430f23edf09d988e7e7eb3d7e87cb46
Message ID: <199412022333.PAA12885@netcom8.netcom.com>
Reply To: <9412022313.AA09532@cfdevx1.lehman.com>
UTC Datetime: 1994-12-02 23:33:12 UTC
Raw Date: Fri, 2 Dec 94 15:33:12 PST

Raw message

From: jamesd@netcom.com (James A. Donald)
Date: Fri, 2 Dec 94 15:33:12 PST
To: rfb@lehman.com
Subject: Re: Mighty morphing power cypherpunks
In-Reply-To: <9412022313.AA09532@cfdevx1.lehman.com>
Message-ID: <199412022333.PAA12885@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Rick Busdiecker writes
> 
>     From: "James A. Donald" <jamesd@netcom.com>
>     Date: Thu, 1 Dec 1994 19:15:35 -0800 (PST)
>     
>     So autonag every nym to send a public key in.
> 
> Where do you send the autonag message?  Do you trust the From: or
> Reply-To: fields?

It does not matter who the true identity associated with a
public key is.  My proposal is only that signatures
be checked for consistent identity, not true name.

Requiring true names would be most uncypherpunk.

So it would be up to the nym to get his true public
key to the list, not up to the list to discover the
correct public key that signs a posting by a nym.


-- 
 ---------------------------------------------------------------------
We have the right to defend ourselves and our
property, because of the kind of animals that we        James A. Donald
are.  True law derives from this right, not from
the arbitrary power of the omnipotent state.            jamesd@acm.org





Thread