1995-09-10 - Dishonest banks & ecash

Header Data

From: Michael Froomkin <mfroomki@umiami.ir.miami.edu>
To: list ecash <cypherpunks@toad.com>
Message Hash: 404dcf18f479c086cea95e7a55bf19450b9516b024f0c8793fbdff78f426c184
Message ID: <Pine.PMDF.3.91.950910013128.541131339C-100000@umiami.ir.miami.edu>
Reply To: N/A
UTC Datetime: 1995-09-10 05:33:22 UTC
Raw Date: Sat, 9 Sep 95 22:33:22 PDT

Raw message

From: Michael Froomkin <mfroomki@umiami.ir.miami.edu>
Date: Sat, 9 Sep 95 22:33:22 PDT
To: list ecash <cypherpunks@toad.com>
Subject: Dishonest banks & ecash
Message-ID: <Pine.PMDF.3.91.950910013128.541131339C-100000@umiami.ir.miami.edu>
MIME-Version: 1.0
Content-Type: text/plain


I've been doing some ecash reading.  The threat model is the dishonest 
user or 3rd party who tries to mint the stuff.  Any work been done on the 
problem of the dishonest bank (a la Bcci) that tries to mint the stuff?

A. Michael Froomkin        | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law | mfroomki@umiami.ir.miami.edu
U. Miami School of Law     | 
P.O. Box 248087            | It's hot here.  And humid.
Coral Gables, FL 33124 USA |
See (soon to move to its real home): http://www.law.miami.edu/~mfroomki






Thread