1998-10-26 - Rendering ( was MIB Subponeas )

Header Data

From: Michael Motyka <mmotyka@lsil.com>
To: cypherpunks@toad.com
Message Hash: 7225c94d8ed7460449cf3b12847cddfaae2315aa0c4cf48f88242e78e30673ed
Message ID: <3634CE28.66CC@lsil.com>
Reply To: N/A
UTC Datetime: 1998-10-26 20:22:39 UTC
Raw Date: Tue, 27 Oct 1998 04:22:39 +0800

Raw message

From: Michael Motyka <mmotyka@lsil.com>
Date: Tue, 27 Oct 1998 04:22:39 +0800
To: cypherpunks@toad.com
Subject: Rendering ( was MIB Subponeas )
Message-ID: <3634CE28.66CC@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain



> Protective intelligence programs are based on the idea that the risk of
> violence is minimized if persons with the interest, capacity and willingness
> to mount an attack can be identified and rendered harmless before they
> approach a protected person.

I'm all for reducing the risk of violence but...

Interest, capacity and willingness are insufficient when taken alone.

Collecting real names and addresses is, apparently, enough of a concrete
step to at least begin the "rendering" process. 

Through rendering we can provide many useful by-products including
fertilizer, soap, glue and a horrible stink downwind from the plant.

If an AP bot were renamed, for instance, a Collectively Rewarded Action
Program would it be as obvious a target? One could then post Action
Items and Action Rewards to it anonymously. Everything from cleaning the
litter off Rt 680 in Fremont to hosing Monsanto ( the foul-milk,
press-squashing, poison-cow BST boys ). Then what would be needed is
some sort of Eternity Service for an active server - detect tampering
and jump hosts.

Mike





Thread