From: anon-remailer@utopia.hacktic.nl (Anonymous)
To: cypherpunks@toad.com
Message Hash: 35162ab6e4112cdbee3d10181e97b0802293c034b8f0ddc48d3de2486626f1d8
Message ID: <199510110855.JAA17966@utopia.hacktic.nl>
Reply To: N/A
UTC Datetime: 1995-10-11 08:55:32 UTC
Raw Date: Wed, 11 Oct 95 01:55:32 PDT
From: anon-remailer@utopia.hacktic.nl (Anonymous)
Date: Wed, 11 Oct 95 01:55:32 PDT
To: cypherpunks@toad.com
Subject: MITM evasionMITM evasion
Message-ID: <199510110855.JAA17966@utopia.hacktic.nl>
MIME-Version: 1.0
Content-Type: text/plain
Two years ago, I pointed out that getting a single message past
the man in the middle isn't good enough; you have to convince your
readers that the key they received on one channel is more accurate
than the key they're receiving on all the other channels.
But if they'll believe that, they may also believe the man in the middle's
announcement that the key in your name on all the keyservers is
wrong, and the correct key is the one he's putting out.
Can't win either way, but it's still important to get the key out.
My current key is 0x54696D4D; the fingerprint is
4D 65 44 75 53 61 21 2F 41 73 55 64 85 6D 21 7F.
..........................................................................
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@sensemedia.net | anonymous networks, digital pseudonyms, zero
408-728-0152 | knowledge, reputations, information markets,
Corralitos, CA | black markets, collapse of governments.
Higher Power: 2^756839 | Public Key: PGP and MailSafe available.
"National borders are just speed bumps on the information superhighway."
Return to October 1995
Return to “Scott Brickner <sjb@universe.digex.net>”