1996-06-29 - PC-ness of nym.alias.net

Header Data

From: Rich <rich@netbox.com>
To: cypherpunks@toad.com
Message Hash: e66fe0b016b450e7524164919be04eae706007b1d8c5cb18c10bcf38460434d0
Message ID: <199606290304.DAA15488@netbox.com>
Reply To: N/A
UTC Datetime: 1996-06-29 05:56:11 UTC
Raw Date: Sat, 29 Jun 1996 13:56:11 +0800

Raw message

From: Rich <rich@netbox.com>
Date: Sat, 29 Jun 1996 13:56:11 +0800
To: cypherpunks@toad.com
Subject: PC-ness of nym.alias.net
Message-ID: <199606290304.DAA15488@netbox.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 28 Jun 1996, Anonymous wrote:

> I would appreciate any information members may have regarding the
> security/safety of the new nym server nym.alias.net (in "alpha" state) who
> posted here about 3 weeks ago. Nym.alias.net reportedly is the same
> machine as anon.lcs.mit.edu. 
> 
> Specifically, is the individual running the nym _known_ to cypherpunks, or
> is this an unknown about whom I should have serious doubts.

I could tell you who it is, but then I'd have to kill you. So let's just
stick to publicly available information. 

According to the root DNS servers, which as we know are controlled by a ZOG
defense contractor, alias.net is an alias for alpha.jpunix.com, and
anon.lcs.mit.edu is indeed the same as nym.alias.net. alias2-dom is said to
get name service from Sameer and company, but that could be a trap. 

Obviously, they've infiltrated pretty deep, but thanks to you, we know to
be careful.

Then again, this could just be FUD from another Fucking Statist. Who
knows? 

Somewhat more seriously, wouldn't it be nice if the various remailers signed
each other's keys?

- -rich

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQBVAwUBMdScnJNcNyVVy0jxAQEwFQH/ZXv+9Nj5ZDjk5FpA33T+kw68H39p/SuW
Ab/hRfGGkZX97PIa50C7UVu4YROYE9RYcn7kalsZgFKOsJKAq3JKIw==
=1CQg
-----END PGP SIGNATURE-----






Thread