From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
To: cypherpunks@Algebra.COM
Message Hash: 66fcd8d28c6b9e9534d31eea569f56af86b4436f42fc9b983cc032f5b400410e
Message ID: <19971104042001.4745.qmail@nym.alias.net>
Reply To: N/A
UTC Datetime: 1997-11-04 04:26:04 UTC
Raw Date: Tue, 4 Nov 1997 12:26:04 +0800
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 4 Nov 1997 12:26:04 +0800
To: cypherpunks@Algebra.COM
Subject: PGP 5.0: Keyservers
Message-ID: <19971104042001.4745.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain
Out of curiosity, what protection is there for PGP 5.x users submitting keys
to the keyservers? Would it not be trivial for somebody to see what dialup
SLIP link a key is coming from and tie that key to the person submitting it?
That isn't a problem for personal keys, but it is a big problem for
psuedonyms. Is there some kind of mechanism in place for submitting such
keys via anonymous remailers?
This might already have been covered by other Cypherpunks or the PGP folks.
ParanoiaMonger
Return to November 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”