From: TruthMonger <tm@dev.null>
To: remailer-politics@server1.efga.org
Message Hash: d3b924b8f89ae81d1f998b9bb9564ed5c493930d9a6a61857f8c242deba8b75b
Message ID: <34421071.7F14@dev.null>
Reply To: <0f045e50bea80f9d8eee2e6994b8052b@anon.efga.org>
UTC Datetime: 1997-10-13 12:27:45 UTC
Raw Date: Mon, 13 Oct 1997 20:27:45 +0800
From: TruthMonger <tm@dev.null>
Date: Mon, 13 Oct 1997 20:27:45 +0800
To: remailer-politics@server1.efga.org
Subject: Re: [RePol] First Post!
In-Reply-To: <0f045e50bea80f9d8eee2e6994b8052b@anon.efga.org>
Message-ID: <34421071.7F14@dev.null>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Jari Aalto, confirmed by veteran, respected CypherPunk
Dr. Dimitir Vulis, KOTM, to be a government disinformation
artist, wrote:
> | Sat 97-10-11 Anonymous <anon@anon.efga.org> list.repol
> | I've downloaded pgp.
>
> | How do I send the key to this list ?
> Don't!
DO!
> [From ema-tipgp.html]
Notice there is no verifiable URL pointer given for this alleged
reference. Typical of spoofing attacks.
> 10.0 General PGP guidelines
According to who? Aunt Ema, or Tot?
> 10.1 About including the public key in the mail message
>
> Do not distribute your public key by mail or Usenet post,
because
> there are more proper ways. People generally do not want
that 'you'
> send the key to them, instead they want to get it by itself
from
> some trusted channel: finger or key server. The reason for
this
> should be obvious: email is not a secure channel, anyone can
> replace the contents of your mail with something other.
Bullshit. Email is no less secure than other channels on the
InteNet.
(Is too!) {Is not!} (Is too!) {Is not!} (Is too!) {Is not!}
The chances of your public key being compromised through email to a
mailing list are slim.
> Use some/all of the ways here to make your public key
available:
>
> o Put it in your ~/.plan file, so people can simply finger
> you for it. Open the ~/.plan file and just insert key
there,
> ,then anyone who fingers you can read the key:
>
> % finger foo@site.com
Bad idea! It makes it vulnerable to attack by those with access to
your system(s), as well as to attack by outside hackers.
> o Post it to a public-key server which in turn
automatically
> ,distributes your key to all the other keyservers.
Be aware that the public-key servers are run by agents of the
federal
government whose goal is to prevent crypto users from avoiding
registering
their keys with coming GAK laws.
> | I'm new at all this anonymous stuff!
>
> Please read the pgp docs that came along the program. More pgp and
> remailing pointers can be found from my main page
>
> ftp://cs.uta.fi/pub/ssjaaa/ssjaaa.html
Which is full of lies!
Please note that the proper procedures for obtaining and using
Crypto Keys are outlined by CypherPunk Notable Newbie of the Year,
A. Hoir, in a series of posts on the CypherPunks mailing list.
I am including my public key below, within the body of this email,
and it can be verified by checking it against the listing for my
keys on the keyserver at http://www.pgp.com/ .
Lastly, and most importantly, take the time and effort to verify
for yourself any claims made by those posting to mailing lists, in
general, and using anonymous or misleading personas, in particular.
TruthMonger
>
*===================================================================*
> To unsubscribe or subscribe send a message of UNSUBSCRIBE or
SUBSCRIBE to
> the email address REMAILER-POLITICS-REQUEST@SERVER1.EFGA.ORG
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP for Personal Privacy 5.0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=
=SubM
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNEIPuNVQ+s43zWjfEQKX+wCg5MydykFtaUVN9Pj9mYbT55SdWzMAoKeD
SlKAfuAz3OGRko9Chm11NBFy
=S6R7
-----END PGP SIGNATURE-----
Return to October 1997
Return to “TruthMonger <tm@dev.null>”
Unknown thread root