how to release code if the programmer is a target for (fwd)

Steve Schear schear at lvdi.net
Sun Jan 18 11:49:21 PST 1998



At 7:23 PM -0600 1/17/98, Jim Choate wrote:
>Forwarded message:
>
>> Subject: Re: how to release code if the programmer is a target for (fwd)
>> From: Ryan Lackey <rdl at mit.edu>
>> Date: 17 Jan 1998 19:07:10 -0500
>
>> Eternity delivers data.  It's up to the user to verify that the data is
>> what they want
>
>> The original question was how to verify the eternity server source code.
>
>How are these fundamently different? Assume for a moment that as a user of
>an eternity server the source is the data I want.

(I didn't see anyone comment on my posting under "Re: remailer resistancs to attack", so I thought I'd repost under this thread.  My apologies for any inconvience.)

Came across this paper and thought it might contribute to improving remailer reliability, "How to Maintain Authenticated Communication in the Presence of Break-ins," http://theory.lcs.mit.edu/~tcryptol/OLD/old-02.html

--Steve








More information about the cypherpunks-legacy mailing list