[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: how to release code if the programmer is a target for (fwd)




At 7:23 PM -0600 1/17/98, Jim Choate wrote:
>Forwarded message:
>
>> Subject: Re: how to release code if the programmer is a target for (fwd)
>> From: Ryan Lackey <[email protected]>
>> Date: 17 Jan 1998 19:07:10 -0500
>
>> Eternity delivers data.  It's up to the user to verify that the data is
>> what they want
>
>> The original question was how to verify the eternity server source code.
>
>How are these fundamently different? Assume for a moment that as a user of
>an eternity server the source is the data I want.

(I didn't see anyone comment on my posting under "Re: remailer resistancs to attack", so I thought I'd repost under this thread.  My apologies for any inconvience.)

Came across this paper and thought it might contribute to improving remailer reliability, "How to Maintain Authenticated Communication in the Presence of Break-ins," http://theory.lcs.mit.edu/~tcryptol/OLD/old-02.html

--Steve