At 7:23 PM -0600 1/17/98, Jim Choate wrote:
Forwarded message:
Subject: Re: how to release code if the programmer is a target for (fwd) From: Ryan Lackey <rdl@mit.edu> Date: 17 Jan 1998 19:07:10 -0500
Eternity delivers data. It's up to the user to verify that the data is what they want
The original question was how to verify the eternity server source code.
How are these fundamently different? Assume for a moment that as a user of an eternity server the source is the data I want.
(I didn't see anyone comment on my posting under "Re: remailer resistancs to attack", so I thought I'd repost under this thread. My apologies for any inconvience.) Came across this paper and thought it might contribute to improving remailer reliability, "How to Maintain Authenticated Communication in the Presence of Break-ins," http://theory.lcs.mit.edu/~tcryptol/OLD/old-02.html --Steve