From: Anonymous <nobody@anon.olymp.org>
To: cypherpunks@toad.com
Message Hash: 4f3a1883cee613783f61869450ea592f9e7cf6cde9e3a410bda777a6b44c6e62
Message ID: <ed4d64ff287d4e98c0e76cdc3d0e33cf@anonymous>
Reply To: N/A
UTC Datetime: 1998-09-09 11:04:01 UTC
Raw Date: Wed, 9 Sep 1998 19:04:01 +0800
From: Anonymous <nobody@anon.olymp.org>
Date: Wed, 9 Sep 1998 19:04:01 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <ed4d64ff287d4e98c0e76cdc3d0e33cf@anonymous>
MIME-Version: 1.0
Content-Type: text/plain
Dear Mr Gordon,
When I checked the
digital signature on the Internet death threat using the PGP software
and JOHNSON'S secret key ring, the computer identified the signature
as one of the signature keys stored in JOHNSON'S computer. Because
both the "private" and "public" portions of the "key" were stored on
JOHNSON'S computer, the message can be authenticated as having been
generated by the person who possessed this "secret key" and knew the
correct password. In other words, only the person possessing the
secret key found on JOHNSON'S computer could have generated the "death
threat" message.
Why would you claim only one person possessed the secret key? As you
doubtlessly know, some of the TruthMonger secret keys have been posted
to Cypherpunks anonymously. This is not authentication. Thank you.
Return to September 1998
Return to “Declan McCullagh <declan@well.com>”