From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: a6e069594771449b43b99e91c2303f6f1a4a41efdd144abd350914ab7cb0c12c
Message ID: <199610021343.NAA08231@pipe3.ny3.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-10-02 17:13:59 UTC
Raw Date: Thu, 3 Oct 1996 01:13:59 +0800
From: jya@pipeline.com (John Young)
Date: Thu, 3 Oct 1996 01:13:59 +0800
To: cypherpunks@toad.com
Subject: REM_ail
Message-ID: <199610021343.NAA08231@pipe3.ny3.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
10-8-96. VV:
"The Remailer Is Dead, Long Live the Remailer. Life After
Penet." By Dave Mandl (Excellent, Dave, yes!)
By the strict standards of the cypherpunks, a loosely
knit affinity group of the Net's most radical and
technoliterate privacy advocates, Penet's security was
actually on the flimsy side. Its Achilles' heel was the
file -- just begging to be subpoenaed -- that linked
users' real names to their Penet pseudonyms.
Cypherpunk-run remailers, on the other hand, generally
leave no trace of the sender's true identity. In
addition, cypherpunk remailers can be "chained" --
messages can be routed through several far-flung
remailers before reaching their final destination, making
message tracing all but impossible, even for the remailer
operators.
-----
http://jya.com/remail.txt
ftp://jya.com/pub/incoming/remail.txt
REM_ail
Return to October 1996
Return to “jya@pipeline.com (John Young)”
1996-10-02 (Thu, 3 Oct 1996 01:13:59 +0800) - REM_ail - jya@pipeline.com (John Young)