From: sidney@taurus.apple.com (Sidney Markowitz)
To: cypherpunks@toad.com
Message Hash: 9d19d5492fddafa0ed1aaafcc2cae73b874a8e3b09291411a77377a17089501b
Message ID: <9407192158.AA06714@federal-excess.apple.com>
Reply To: N/A
UTC Datetime: 1994-07-19 23:21:32 UTC
Raw Date: Tue, 19 Jul 94 16:21:32 PDT
From: sidney@taurus.apple.com (Sidney Markowitz)
Date: Tue, 19 Jul 94 16:21:32 PDT
To: cypherpunks@toad.com
Subject: Re: the Cypherpunk and the Shadow
Message-ID: <9407192158.AA06714@federal-excess.apple.com>
MIME-Version: 1.0
Content-Type: text/plain
I said:
>If someone tried to generate a million different identities
>and public keys, that could be dealt with by imposing a time delay for
>registration
Whoops. Of course that wouldn't work. If a delay was imposed after any
registration before processing any next one, then there's an obvious denial
of service attack by simply sending in lots of registrations. And if there
isn't, someone can simply register a zillion different e-mail addresses and
public keys and send each copy of a mail bomb from a different one. Someone
who wants to build up a reputation can already do it anonymously (like
Pr0duct Cypher), while someone who wants to make trouble doesn't need to
build up a reputation. Oh well.
-- sidney <sidney@apple.com>
Return to July 1994
Return to “sidney@taurus.apple.com (Sidney Markowitz)”
1994-07-19 (Tue, 19 Jul 94 16:21:32 PDT) - Re: the Cypherpunk and the Shadow - sidney@taurus.apple.com (Sidney Markowitz)