From: Linn Stanton <lstanton@sten.lehman.com>
To: cypherpunks@toad.com
Message Hash: 5c5922fd11e647366d15a623bcb19a2420cb5c6c7c1f0cbc3f63f5ef25701412
Message ID: <9408261422.AA24054@sten.lehman.com>
Reply To: <199408260641.XAA11326@netcom15.netcom.com>
UTC Datetime: 1994-08-26 14:20:44 UTC
Raw Date: Fri, 26 Aug 94 07:20:44 PDT
From: Linn Stanton <lstanton@sten.lehman.com>
Date: Fri, 26 Aug 94 07:20:44 PDT
To: cypherpunks@toad.com
Subject: Re: Cash, cheaters, and anonymity
In-Reply-To: <199408260641.XAA11326@netcom15.netcom.com>
Message-ID: <9408261422.AA24054@sten.lehman.com>
MIME-Version: 1.0
Content-Type: text/plain
tcmay@localhost.netcom.com (Timothy C. May) writes:
> **The purist approach: you *are* your key. If another biological unit
> obtains your key, he or she is effectively you. Guard your key carefully.
>
> **The modern American "excuse" approach: Hey, if you want to disavow a
> contract, like, just claim your key was stolen or, like, you lost it.
>
> I understand the reasoning behind adopting a more intermediate stance, but
> I think that only the purist stance will hold water in the long run.(A hint
> of this: untraceable cash means, for most transactions of interest with
> digital cash, that once the crypto stuff has been handled, whether the sig
> was stolen or not is moot, because the money is gone...no court can rule
> that the sig was invalid and then retrieve the cash!)
I would love the purist stance, except that it is untenable. Every security
system is breakable, if enough effort, money, and professionalism are involved.
We should never kid ourselves about this. One time pads are provably secure,
but someone can still break in and physically steal your plaintext, or steal
you and bring out the rubber hoses...
If crypto does become widespread, then it will be used in situations where
the value of the key justifies considerable effort and expense to steal it,
and it will happen. There must always be a mechanism to deal with repudiation.
As to your later point about mootness, I would not be comfortable saying that
there are limits to what a court will attempt to coerce cooperation.
> * Plan A: The protocol insists on retinal scan or other biometric
> authentication between the "smartcard" used as the cryptographic keying
This is just a second private key, and no more immune to forgery or theft by
a professional.
Return to August 1994
Return to “tcmay@netcom.com (Timothy C. May)”