From: John Curtis <firstname.lastname@example.org>
Message Hash: e8045db23ecd4ebb224363fbdd36a19bff567dad817ed0031f7d3769c97e01d9
Message ID: <01BA9D49.9E1723C0@hy35.capecod.net>
Reply To: N/A
UTC Datetime: 1995-10-18 15:03:50 UTC
Raw Date: Wed, 18 Oct 95 08:03:50 PDT
From: John Curtis <email@example.com> Date: Wed, 18 Oct 95 08:03:50 PDT To: "'firstname.lastname@example.org> Subject: Anonymity: A Modest Proposal Message-ID: <01BA9D49.9E1723C0@hy35.capecod.net> MIME-Version: 1.0 Content-Type: text/plain I think that what you propose could be modeled as an anonymous remailing distributed process. If designed correctly, such a process could be made extremely difficult to shut down (even for us!) There are more than enough texts written on how to do this correctly; no need to reinvent the wheel.