From: meyer <wixer!wixer.bga.com!meyer@cactus.org>
To: cypherpunks@toad.com
Message Hash: fad6fcbf90bf96c7b3535fda21ffadccce7ed452527c8b65e6370141e4c1bfdd
Message ID: <9305240651.AA16024@wixer>
Reply To: N/A
UTC Datetime: 1993-05-24 12:42:30 UTC
Raw Date: Mon, 24 May 93 05:42:30 PDT
From: meyer <wixer!wixer.bga.com!meyer@cactus.org>
Date: Mon, 24 May 93 05:42:30 PDT
To: cypherpunks@toad.com
Subject: FAQ
Message-ID: <9305240651.AA16024@wixer>
MIME-Version: 1.0
Content-Type: text/plain
Damned line noise zapped this last time just as I was about to send it.
I don't think it went (uustat apparently knew nothing of it), so here
it is again:
From Eric Raymond's draft FAQ:
>The Cypherpunks list exists to build and propagate privacy software. Our
>aim is to give you the tools to communicate with other people and computers
>in ways snoopers cannot tap.
>
>2. What are the essentials of privacy software?
> a. Public-key cryptosystems for secure communication.
> b. Unforgeable electronic signatures for message authentication.
> c. DC-net or similar protocols to thwart spoofing.
Privacy extends to more than just invulnerability to eavesdropping
upon one's communications. One may have private records which are
viewed only by oneself, and never communicated. A cryptosystem
suitable for encryption of such non-communicated information need
not be a public-key cryptosystem. Thus:
2 d. Cryptosystems for protecting privately-held information
against unauthorized access.
Return to May 1993
Return to “meyer <wixer!wixer.bga.com!meyer@cactus.org>”
1993-05-24 (Mon, 24 May 93 05:42:30 PDT) - FAQ - meyer <wixer!wixer.bga.com!meyer@cactus.org>