1998-09-09 - No Subject

Header Data

From: Anonymous <nobody@anon.olymp.org>
To: cypherpunks@toad.com
Message Hash: 4f3a1883cee613783f61869450ea592f9e7cf6cde9e3a410bda777a6b44c6e62
Message ID: <ed4d64ff287d4e98c0e76cdc3d0e33cf@anonymous>
Reply To: N/A
UTC Datetime: 1998-09-09 11:04:01 UTC
Raw Date: Wed, 9 Sep 1998 19:04:01 +0800

Raw message

From: Anonymous <nobody@anon.olymp.org>
Date: Wed, 9 Sep 1998 19:04:01 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <ed4d64ff287d4e98c0e76cdc3d0e33cf@anonymous>
MIME-Version: 1.0
Content-Type: text/plain



Dear Mr Gordon,

   When I checked the
   digital signature on the Internet death threat using the PGP software
   and JOHNSON'S secret key ring, the computer identified the signature
   as one of the signature keys stored in JOHNSON'S computer. Because
   both the "private" and "public" portions of the "key" were stored on
   JOHNSON'S computer, the message can be authenticated as having been
   generated by the person who possessed this "secret key" and knew the
   correct password. In other words, only the person possessing the
   secret key found on JOHNSON'S computer could have generated the "death
   threat" message.

Why would you claim only one person possessed the secret key? As you
doubtlessly know, some of the TruthMonger secret keys have been posted
to Cypherpunks anonymously. This is not authentication. Thank you.





Thread