From: Lucky Green <shamrock@netcom.com>
To: “Roger J. Jones” <cyber@ibpinc.com>
Message Hash: a0daf38126b4ca669298c48b6298bc14c3889068227686a2a1c603d66d3ced1a
Message ID: <Pine.3.89.9705141750.A2785-0100000@netcom19>
Reply To: <01BC603F.4B529240@pc1901.ibpinc.com>
UTC Datetime: 1997-05-15 01:21:55 UTC
Raw Date: Thu, 15 May 1997 09:21:55 +0800
From: Lucky Green <shamrock@netcom.com>
Date: Thu, 15 May 1997 09:21:55 +0800
To: "Roger J. Jones" <cyber@ibpinc.com>
Subject: Re: Anonymous Remailers
In-Reply-To: <01BC603F.4B529240@pc1901.ibpinc.com>
Message-ID: <Pine.3.89.9705141750.A2785-0100000@netcom19>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, 14 May 1997, Roger J. Jones wrote:
> Why is it that some who are very concerned about their personal privacy utilize anonymous remailers that:
>
> 1) Log all of their mail messages?
> 2) Are in many cases reputed to be run by foreign intelligence services?
Net.myths
> Do they really trust the owner of the remailer? (Unless of course, it is
their remailer?) I seem to be missing something.
You are missing the fact that you can chain remailers. Therefore it is
pretty much irrelevant if some remailers are compromised.
Then again, I know several remailer operators personally. Which makes me
less worried about the them being foreign intelligence agents.
-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred
Return to May 1997
Return to “tzeruch@ceddec.com”