1994-08-09 - Re: Key Coercion after encrypted message transmission.

Header Data

From: greg@ideath.goldenbear.com (Greg Broiles)
To: cypherpunks@toad.com
Message Hash: 0d18f1af022e4101266d170a215a030c3babf2340734caab51c8f46994b3548c
Message ID: <m0qXmrA-0005INC@ideath.goldenbear.com>
Reply To: <199408090533.AA06475@xtropia>
UTC Datetime: 1994-08-09 08:47:37 UTC
Raw Date: Tue, 9 Aug 94 01:47:37 PDT

Raw message

From: greg@ideath.goldenbear.com (Greg Broiles)
Date: Tue, 9 Aug 94 01:47:37 PDT
To: cypherpunks@toad.com
Subject: Re: Key Coercion after encrypted message transmission.
In-Reply-To: <199408090533.AA06475@xtropia>
Message-ID: <m0qXmrA-0005INC@ideath.goldenbear.com>
MIME-Version: 1.0
Content-Type: text


-----BEGIN PGP SIGNED MESSAGE-----

An anonymous author writes:

[describes an interesting technique to avoid coerced key disclosure]

> A little thought shows that such a system could be used in some
> applications of interest to cypherpunks. The ability to implement such
> a system is clearly within our grasp. Therefore, the cypherpunk CODE
> requires that the cypherpunks analyze, design, code and make such a
> system widely available according to the grand traditions established
> by previous cypherpunks. 

Unfortunately, you seem to have received one of the early drafts of
the Cypherpunk Code; they're easy to spot because a fumble-fingered
editor left out a few words while recopying meeting minutes. The
Revised Cypherpunk Code of 1993 states:

RCC 23.110:
In accordance with the grand traditions established by previous
cypherpunks (RCC 10.100, et seq), any cypherpunk who suggests that
"someone" or "a cypherpunk" or "the cypherpunks" must implement a
new idea shall be required to code the implementation themselves,
on the platform of their choice.

RCC 23.120:
A cypherpunk required by RCC 23.110 to code an implementation may
employ the work of others as a base for their implementation. The
Librarian of the Cypherpunks is authorized to lend the implementor
a copy of _Applied Cryptography_ until the implementation is finished.

Fans of legislative history will remember the passionate debates 
between the theoretical cypherpunks - who stood opposed to any
coerced effort - and the practice-based cypherpunks, who argued that
this re-education effort was required to build the proper [post-]
revolutionary consciousness, particularly in the "why can't someone
else do it for me" climate of the mid-1990's. The debate ended when
Zaxxon, an outspoken critic of the remailers, insisted that all
cypherpunk software be rewritten - twice - to his specifications. The
Cypherpunk Assembly voted 99-0 (1 abstention) to enact the 
"Do It Your Own Damn Self Act" of 1993, codified as RCC 23.110-120.


-----BEGIN PGP SIGNATURE-----
Version: 2.5

iQCVAgUBLkdCuX3YhjZY3fMNAQFvYAP/SH/FHSOXO+CDDikY9G3Cz9PSGhxUQTAC
gMjtTaxafxA8m1MrbW0TPc6lz0HHQfm5f1rkouBhUp8HEvum1LdybbZ79FDfF8Rz
0OtQUt/2oPfVnZd28XhwKZTSPn4tFSa074xMwFJLEcP2YpJoB/U6bEbe1ACA/3+U
ypHvbQDA60w=
=bQ5X
-----END PGP SIGNATURE-----




Thread