1995-07-23 - Re: Java (was Netscape: the big win)

Header Data

From: alan.pugh@internetmci.com (Alan Pugh)
To: cypherpunks@toad.com
Message Hash: c5da099e0589d191e023f5bb1b1b5d6cb71f88ac7304fc7aedde6da7e403dfb9
Message ID: <01HT6RA4SJ3A938ROQ@MAILSRV1.PCY.MCI.NET>
Reply To: N/A
UTC Datetime: 1995-07-23 02:45:35 UTC
Raw Date: Sat, 22 Jul 95 19:45:35 PDT

Raw message

From: alan.pugh@internetmci.com (Alan Pugh)
Date: Sat, 22 Jul 95 19:45:35 PDT
To: cypherpunks@toad.com
Subject: Re: Java (was Netscape: the big win)
Message-ID: <01HT6RA4SJ3A938ROQ@MAILSRV1.PCY.MCI.NET>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

> There are many crypto-anarchy applications as well:

> Key cracking.  If you can write a key-cracker and keyspace fetcher in
> Java,  then people can join key cracking efforts as easily looking up
> an URL.  It  may not be nearly as efficient as the highly optimized C
> versions used in the  current RC4-40 efforts, but there's going to be
> millions of potential workers  this way.  If you were charging money
> to break keys (or you were looking for  keys that are very valuable
> to you), you could set up the worker client to  accept e-cash for in
> return for searching keyspace "Click here to earn money  while you
> aren't using your machine..."   Ensuring that workers are actually
> searching the keyspace and other implementation details is left as an
> exercise for the reader.
>
> e-instrument or information exchanges, with Java interfaces for bidding,
> buying, selling, etc...

i think i prefer the idea mentioned previously on the list where it
works pretty much like a lottery. you could operate it in one of two
ways. if the encrypted data was particularly valuable to its owner
and was willing to put up a reward for the key, there would be an
incentive for people to spend idle time running through keyspace.

if it was structured as a reward, no money need be paid until the key
is found.

it could also be set up more like a traditional lottery where you
'buy' x amont of keyspace and if you hit it, all e-cash collected
would go to you. there would be many problems with running this.
nothing could keep someone from just running keys on their own in the
hope of hitting it, then buy the keyspace that contains it if he got
a hit. if the keyspace were allocated sequentially, and the person
looking for the key only paid to the person who initially 'purchased'
the keyspace, the person who got it could advertise for the person
who got the space, although this would be problematic.

if someone really wanted to do this, it would be _much_ easier to
just run the operation similar to what was performed here in
cypherpunks recently with the person who first reports the hit
getting a reward of some amount, less a modest amount for the
person/group coordinating the effort.


amp
<0003701548@mcimail.com>
<alan.pugh@internetmci.com>
Key fingerprint =  A7 97 70 0F E2 5B 95 7C  DB 7C 2B BF 0F E1 69 1D
July 22, 1995   14:35



if someone wants a key and is willing to pay someone


DataHavens, which would probably require complex (internally) software to use.

I'm sure the online casino people are salivating over the prospects too...

Basically any fancy crypto application that requires a custom client to
operate...  Since its platform independent, efforts will be put to better use
as well.


andrew

-----BEGIN PGP SIGNATURE-----
Version: 2.61

iQEVAwUBMBEazygP1O9KJoPBAQGHFwgAiO2ha7BFw04Fu3RNuk9FLFaZNrUYrFjR
5VBNkWeE3JOol7xSfrd7V8IzE2UyrVEwa4eyx5jHrPVQYxC9UTHzUW5nG3/vMefD
gtCsQQcz5hL3Qbv6Cn2dqkTkWGbL7y/MxmblBm0u8vdX6/LPjAVTfucNrN9KxDY/
NXDM3tr9FclAWch6VKiXvjMeoognXNtpFfI76ReZzimJ4Yyoy9naGQ8BLdPiU1Xb
mZIuFnVQWJe56YlBBgXo1aLsAcg48oWYCSMQXPRiQ/Bd6kL/Q6KHv34IbV8WVYib
9XjJd84JU+he5LDOIn9SO7gLXkRuBiiRsOalX89jjwAvFZwQuLMpGQ==
=rqot
-----END PGP SIGNATURE-----
          *********************************************
          *          / Only God can see the whole     *
          *  O[%\%\%{<>===========================-   *
          *          \ Mandlebrot Set at Once!        *
          * amp                                       *
          * <0003701548@mcimail.com>                  *
          * <alan.pugh@internetmci.com>               *
          *********************************************
Key fingerprint =  A7 97 70 0F E2 5B 95 7C  DB 7C 2B BF 0F E1 69 1D







Thread