1993-09-11 - DIGITAL WARFARE

Header Data

From: Sandy <72114.1712@CompuServe.COM>
To: <cypherpunks@toad.com>
Message Hash: f0761e40cd189ab53eeedc0fa3ee00fb6f6e30ea8daf9e4d5fbcad66c2bf4b92
Message ID: <93091116034772114.1712_FHF27-1@CompuServe.COM>
Reply To: _N/A

UTC Datetime: 1993-09-11 16:13:07 UTC
Raw Date: Sat, 11 Sep 93 09:13:07 PDT

Raw message

From: Sandy <72114.1712@CompuServe.COM>
Date: Sat, 11 Sep 93 09:13:07 PDT
To: <cypherpunks@toad.com>
Subject: DIGITAL WARFARE
Message-ID: <930911160347_72114.1712_FHF27-1@CompuServe.COM>
MIME-Version: 1.0
Content-Type: text/plain


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  SANDY SANDFORT               Reply to:  ssandfort@attmail.com
 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Cypherpunks,

Yes, strong crypto can be used for "good or evil."  That's true
of any tool.  And yes, dwelling on the darker applications may be
politically counter-productive.  But do any of you think that
curtailing such discussions will slow up the enemies of privacy
for one second?

Strong crypto is a threat to the powers that be.  Period.  We
know that, and so do they.  The will find reasons to try and stop
it.  If necessary, they will *manufacture* reasons.  They don't
care about kiddie porn or terrorism; they care about their power
base.  And their power base depends on their ability to extract
tribute.  Strong crypto and international diversification
undermine their ability to collect taxes.  They are going to
fight it no matter how innocuously we present ourselves.

I do think we should emphasize *attributes*, not particular
*applications*.  People who need strong crypto will understand
its potential.  We don't have to draw pictures.  As for the
"negative" uses, don't worry, our enemies will gladly describe
them.

 S a n d y

>>>>>>    Please send e-mail to:  ssandfort@attmail.com    <<<<<<
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~






Thread