1994-07-19 - Re: the Cypherpunk and the Shadow

Header Data

From: sidney@taurus.apple.com (Sidney Markowitz)
To: cypherpunks@toad.com
Message Hash: 9d19d5492fddafa0ed1aaafcc2cae73b874a8e3b09291411a77377a17089501b
Message ID: <9407192158.AA06714@federal-excess.apple.com>
Reply To: N/A
UTC Datetime: 1994-07-19 23:21:32 UTC
Raw Date: Tue, 19 Jul 94 16:21:32 PDT

Raw message

From: sidney@taurus.apple.com (Sidney Markowitz)
Date: Tue, 19 Jul 94 16:21:32 PDT
To: cypherpunks@toad.com
Subject: Re: the Cypherpunk and the Shadow
Message-ID: <9407192158.AA06714@federal-excess.apple.com>
MIME-Version: 1.0
Content-Type: text/plain


I said:
>If someone tried to generate a million different identities
>and public keys, that could be dealt with by imposing a time delay for
>registration

Whoops. Of course that wouldn't work. If a delay was imposed after any
registration before processing any next one, then there's an obvious denial
of service attack by simply sending in lots of registrations. And if there
isn't, someone can simply register a zillion different e-mail addresses and
public keys and send each copy of a mail bomb from a different one. Someone
who wants to build up a reputation can already do it anonymously (like
Pr0duct Cypher), while someone who wants to make trouble doesn't need to
build up a reputation. Oh well.

 -- sidney <sidney@apple.com>








Thread