From: Anonymous User <nobody@c2.org>
To: cypherpunks@toad.com
Message Hash: bf54882aed9791fa067901f85984d97a1825e485415f252b48d6734113e57e13
Message ID: <199409171439.HAA13237@zero.c2.org>
Reply To: N/A
UTC Datetime: 1994-09-17 14:41:15 UTC
Raw Date: Sat, 17 Sep 94 07:41:15 PDT
From: Anonymous User <nobody@c2.org>
Date: Sat, 17 Sep 94 07:41:15 PDT
To: cypherpunks@toad.com
Subject: Possible [Best?] Scenario
Message-ID: <199409171439.HAA13237@zero.c2.org>
MIME-Version: 1.0
Content-Type: text/plain
Let's say I have a digital cellular phone. I also have Anonymous Remailers,
PGP, and over 100 BBS numbers (structured for which day and which hour each
would be used) so that I can contact and talk to my "Friend."
Please tell me how the LEA's can find me and understand the transactions
between us?
If I have several encryption programs, can I 'layer' each document [I PGP the
file, the I DES the PGP file, then IDEA for the final layer.
Does the NSA have to crack it one layer at a time, or can they bombard it,
crack the layers in whatever order the supercomputer finds?
If I am missing something, please let me know what I have missed.
Return to September 1994
Return to “Black Unicorn <unicorn@access.digex.net>”