1995-09-22 - Re: The Next Hack

Header Data

From: futplex@pseudonym.com (Futplex)
To: cypherpunks@toad.com (Cypherpunks Mailing List)
Message Hash: 53a23e28359cd1ab38903c09629d6e92cf59aaa26c470af7123d3f96e46fbbd1
Message ID: <9509220901.AA07381@cs.umass.edu>
Reply To: <199509211832.LAA24086@infinity.c2.org>
UTC Datetime: 1995-09-22 09:01:29 UTC
Raw Date: Fri, 22 Sep 95 02:01:29 PDT

Raw message

From: futplex@pseudonym.com (Futplex)
Date: Fri, 22 Sep 95 02:01:29 PDT
To: cypherpunks@toad.com (Cypherpunks Mailing List)
Subject: Re: The Next Hack
In-Reply-To: <199509211832.LAA24086@infinity.c2.org>
Message-ID: <9509220901.AA07381@cs.umass.edu>
MIME-Version: 1.0
Content-Type: text/plain


sameer writes:
> 2) Organize a net-wide search over the space of the RNG seed to 
> crack the private key of some well known secure server.
> 
> 3) Release the private key to the net.

FWIW, for the record, I'm uncomfortable with this. It sounds unethical, IMHO.

For me at least, targeting the key of some particular server that happens to
be out there is over the line.

If you said you would have someone volunteer a supposedly secure server for
the challenge, I'd have no qualms.

But hey, that's just one tentacle's opinion....

-Futplex <futplex@pseudonym.com>
"...when you talk about destruction, don't you know that you can count me out"




Thread