1996-10-16 - Re: extortion via digital cash

Header Data

From: azur@netcom.com (Steve Schear)
To: iang@cs.berkeley.edu (Ian Goldberg)
Message Hash: a8d7418408c2333a9055de4385f8c215a4fa315029184181fb7c96c0aa05ad59
Message ID: <v02130503ae8a7594f02a@[10.0.2.15]>
Reply To: N/A
UTC Datetime: 1996-10-16 18:54:39 UTC
Raw Date: Wed, 16 Oct 1996 11:54:39 -0700 (PDT)

Raw message

From: azur@netcom.com (Steve Schear)
Date: Wed, 16 Oct 1996 11:54:39 -0700 (PDT)
To: iang@cs.berkeley.edu (Ian Goldberg)
Subject: Re: extortion via digital cash
Message-ID: <v02130503ae8a7594f02a@[10.0.2.15]>
MIME-Version: 1.0
Content-Type: text/plain


>-----BEGIN PGP SIGNED MESSAGE-----
>
>In article <v02130503ae891eae8ee1@[10.0.2.15]>,
>Steve Schear <azur@netcom.com> wrote:
>>In this scenario the only
>>reasonable way left to track the money is via linkage (the size and timing
>>of deposits and withdrawls in the kidnapper's account).
>
>Who says the kidnapper has to have an account?
>

If the kidnapper doesn't have an account then they must launder it through
an accomplice (willing or not) in order to convert the money to any other
form.  Of course, if ecash becomes ubiquitous (which I think most on the
list truly desire, for any number of reasons) then, you're right, there's
no need to take value out of the ecash system exceppt for any purchasing
the goods and services one would in any case.

-- Steve







Thread