From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: ba1aab12308eacfac463ab7923c1ab7e910bef01eb471cf617543ecb678b6a2e
Message ID: <199501070432.UAA21211@largo.remailer.net>
Reply To: <Pine.SUN.3.91.950106190639.16522B-100000@eskimo.com>
UTC Datetime: 1995-01-07 04:33:00 UTC
Raw Date: Fri, 6 Jan 95 20:33:00 PST
From: eric@remailer.net (Eric Hughes)
Date: Fri, 6 Jan 95 20:33:00 PST
To: cypherpunks@toad.com
Subject: Re: A Fire Upon the Deep
In-Reply-To: <Pine.SUN.3.91.950106190639.16522B-100000@eskimo.com>
Message-ID: <199501070432.UAA21211@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain
From: Wei Dai <weidai@eskimo.com>
This is quite sensible given that in the Zone universe, you may have no
idea how much computing power your enemies have, so no cryptography
that is only computationally secure can really be trusted.
I asked Vernor about this one a few months ago. He got lucky on this
one. He thought that some advances in theory might render the whole
idea ridiculous. It was not the case that he was considering relative
computational power, which works much better in context, especially
given the hints of some computational power beyond Turing machines.
A great one-liner about debating public-key, in any case.
Eric
Return to January 1995
Return to “Wei Dai <weidai@eskimo.com>”