From: mpd@netcom.com (Mike Duvos)
To: jsday@THUNDER.LakeheadU.CA
Message Hash: df80bcacb0b6e1054e230dd1836a40cb7d67866af601bf5a7150665becacfa12
Message ID: <199403242359.PAA17401@mail.netcom.com>
Reply To: <9403242319.AA15128@thunder.LakeheadU.Ca>
UTC Datetime: 1994-03-24 23:59:05 UTC
Raw Date: Thu, 24 Mar 94 15:59:05 PST
From: mpd@netcom.com (Mike Duvos)
Date: Thu, 24 Mar 94 15:59:05 PST
To: jsday@THUNDER.LakeheadU.CA
Subject: Re: Digital Cash
In-Reply-To: <9403242319.AA15128@thunder.LakeheadU.Ca>
Message-ID: <199403242359.PAA17401@mail.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
> How does the 'tamperproof' nature of the software help at all?
> It's still possible to double-spend in any off-line cash system
> by making multiple copies of the tamper-proof modules.. the only
> security provided is in obscuring the algorithm.
If multiple transactions involving the same instrument reveal the
double-spender, then appropriate action may be taken. One could
of course do the exact same transaction twice with the exact same person
using identical copies of the tamperproof module, but that would
yield no more data than having done the transaction only one time, and
certainly wouldn't create any additional value.
> Speaking of digital cash, many thanks to the author of the
> 'magic money' software. I am in the process of integrating it
> with a local bulletin board, which should hopefully be available
> on the net sometime this summer.
One nice application of Magic Money would be to purchase subscriptions
and other services from a BBS. It is often highly inconvenient to have
to mail in a payment, and if you are paying for something in another
country, sending something that can be cashed overseas. Digital Cash
would solve all these problems.
--
Mike Duvos $ PGP 2.3a Public Key available $
mpd@netcom.com $ via Finger. $
Return to March 1994
Return to “tcmay@netcom.com (Timothy C. May)”