No Subject
Anonymous
nobody at anon.olymp.org
Wed Sep 9 04:04:01 PDT 1998
Dear Mr Gordon,
When I checked the
digital signature on the Internet death threat using the PGP software
and JOHNSON'S secret key ring, the computer identified the signature
as one of the signature keys stored in JOHNSON'S computer. Because
both the "private" and "public" portions of the "key" were stored on
JOHNSON'S computer, the message can be authenticated as having been
generated by the person who possessed this "secret key" and knew the
correct password. In other words, only the person possessing the
secret key found on JOHNSON'S computer could have generated the "death
threat" message.
Why would you claim only one person possessed the secret key? As you
doubtlessly know, some of the TruthMonger secret keys have been posted
to Cypherpunks anonymously. This is not authentication. Thank you.
More information about the cypherpunks-legacy
mailing list