From: Black Unicorn <unicorn@access.digex.net>
To: cypherpunks@toad.com
Message Hash: eb36b482ae6dfa67340b9e80e0087359614eee92f56a45e2a965c38ab66ee80e
Message ID: <199404211923.AA21696@access1.digex.net>
Reply To: N/A
UTC Datetime: 1994-04-21 19:23:48 UTC
Raw Date: Thu, 21 Apr 94 12:23:48 PDT
From: Black Unicorn <unicorn@access.digex.net>
Date: Thu, 21 Apr 94 12:23:48 PDT
To: cypherpunks@toad.com
Subject: Re: Graynet
Message-ID: <199404211923.AA21696@access1.digex.net>
MIME-Version: 1.0
Content-Type: text/plain
->
Nevertheless, I think there would be some value to a GrayNet. There's a
difference between intelligence gathering and analysis on the one hand,
and espionage on the other. Several businesses in the "competitive
intelligence" arena operate quite openly.
And of course, the major players like to work through proxies.
<-
One of the problems here is that business intelligence becomes industrial
espionage partially by way of who is in possession of the information.
In so far as the use of information is determined in part by the motives
of the "spy," those operating a "graynet" would have in their best
interests at least some concept of who they are dealing with, anonymous
transactions may give rise to liability.
In other words, a greynet dealing in industrial intelligence can
effectively become a BlackNet. In this context it makes little sense
to call such an entity a "graynet"
In so far as the information is benign enough to keep a graynet from
becoming a blacknet, there is no use to anonyminity.
A graynet might as well be an open e-mail account.
-uni- (Dark)
Return to April 1994
Return to “Black Unicorn <unicorn@access.digex.net>”
1994-04-21 (Thu, 21 Apr 94 12:23:48 PDT) - Re: Graynet - Black Unicorn <unicorn@access.digex.net>