1997-11-02 - cute.

Header Data

From: Anonymous <anon@anon.efga.org>
To: cypherpunks@Algebra.COM
Message Hash: e44ddccbdf822aa681bea68bc46fa3fe23e7cd4f8a8cc89e896129e31248edff
Message ID: <d1a2b3075f99c1845d71b5c406bf09c5@anon.efga.org>
Reply To: N/A
UTC Datetime: 1997-11-02 04:20:01 UTC
Raw Date: Sun, 2 Nov 1997 12:20:01 +0800

Raw message

From: Anonymous <anon@anon.efga.org>
Date: Sun, 2 Nov 1997 12:20:01 +0800
To: cypherpunks@Algebra.COM
Subject: cute.
Message-ID: <d1a2b3075f99c1845d71b5c406bf09c5@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain



>What's the point in distribuing your public key through the same
>channels as a signature? Kinda defeats the purpose. Esp since I can't
>verify that the given public key is indeed yours, since you're anonymous.

Well, there's some point in it. If I send an anonymous message, sign it with
a key, and then include that key you can use that key to verify that it
indeed was the key used to sign the message. For this to be of any value,
however, future messages should be signed with that key but should not
include it. This just proves that the person who wrote the last message is
the same guy who wrote the first. That's about the only poitn I can see,
though.






Thread