1996-06-16 - Re: Remailer Operator Liability?

Header Data

From: David Rosoff <drosoff@arc.unm.edu>
To: Hal <hendersn@zeta.org.au
Message Hash: c921dd16d547a30972a48149ca4fbaa5663cc1348db35b2a5e81c565609c0086
Message ID: <1.5.4.16.19960616184459.32efa9ca@arc.unm.edu>
Reply To: N/A
UTC Datetime: 1996-06-16 23:40:54 UTC
Raw Date: Mon, 17 Jun 1996 07:40:54 +0800

Raw message

From: David Rosoff <drosoff@arc.unm.edu>
Date: Mon, 17 Jun 1996 07:40:54 +0800
To: Hal <hendersn@zeta.org.au
Subject: Re: Remailer Operator Liability?
Message-ID: <1.5.4.16.19960616184459.32efa9ca@arc.unm.edu>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

At 12.58 PM 6/15/96 -0700, Hal wrote:

>I am pretty sure it is illegal, CDA or not, at least if the material
>is obscene rather than merely indecent.  As Declan says, the issue is
>accountability.  If the remailer operator ends up being considered the
>person who sent the mail, he could be in deep trouble.

This is the problem I have with the whole issue. Obviously, since nyms
use reply blocks, the remailer operators that are inside the reply block
have no control over what is sent (PGP-encrypted) through their remailer.

If I was to go out into the city, and tack up some porno on a building,
maybe something where kids walk by, then someone would take it down, most
likely, but there would be no tracing it to me, because I would be already
long gone from the building. We should make the best efforts we can to
make remailers fully anonymous. My ideas are more that accept PGP, and
(has this already been suggested and/or rejected?) automatic chaining.
That is, remailer #1 could automatically encrypt and send to #2, #3, ...
#n before going on to its destination. The number of added remailers and
which were used could be made random. (ie, have a list of remailers and
pick from it each time...) Would this work?

===============================================================================
David Rosoff (nihongo o chiisaku dekimasu)  ------------->  drosoff@arc.unm.edu
For PGP key 0xD37692F9, finger drosoff@acoma.arc.unm.edu or get from keyservers
pub  1024/D37692F9 1995/07/01 David Rosoff <drosoff@arc.unm.edu>
          Key fingerprint =  25 7D AA 01 85 41 43 89  50 5A 33 76 F1 F1 99 67
I accept anonymous mail. If I didn't sign it, you don't know I wrote it.
===
"Made weak by time and fate, but strong in will / To strive, to seek, to find--
and not to yield." <---- "Ulysses", by Alfred, Lord Tennyson



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMcRVXhguzHDTdpL5AQFc1wP9GiJ6mXeAOY1x/7g1GrCPsWYEZlS5iq84
wfKwgs1W8L+PBQcbrgdhyK2RKDJ7sFrCbz0eSa3OLbDiw5NeKD0LSDAvxuF3Redu
aUpv4yWdYMz71sHz8MF7TxzdOo5a6dg3XtIaRA3Sbt4i2p9dozm/Xg5h4vhgKwWu
/nG1BhTlNGs=
=O4wy
-----END PGP SIGNATURE-----






Thread