From: Michael Froomkin <mfroomki@umiami.ir.miami.edu>
To: list ecash <cypherpunks@toad.com>
Message Hash: 404dcf18f479c086cea95e7a55bf19450b9516b024f0c8793fbdff78f426c184
Message ID: <Pine.PMDF.3.91.950910013128.541131339C-100000@umiami.ir.miami.edu>
Reply To: N/A
UTC Datetime: 1995-09-10 05:33:22 UTC
Raw Date: Sat, 9 Sep 95 22:33:22 PDT
From: Michael Froomkin <mfroomki@umiami.ir.miami.edu>
Date: Sat, 9 Sep 95 22:33:22 PDT
To: list ecash <cypherpunks@toad.com>
Subject: Dishonest banks & ecash
Message-ID: <Pine.PMDF.3.91.950910013128.541131339C-100000@umiami.ir.miami.edu>
MIME-Version: 1.0
Content-Type: text/plain
I've been doing some ecash reading. The threat model is the dishonest
user or 3rd party who tries to mint the stuff. Any work been done on the
problem of the dishonest bank (a la Bcci) that tries to mint the stuff?
A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law | mfroomki@umiami.ir.miami.edu
U. Miami School of Law |
P.O. Box 248087 | It's hot here. And humid.
Coral Gables, FL 33124 USA |
See (soon to move to its real home): http://www.law.miami.edu/~mfroomki
Return to September 1995
Return to “Michael Froomkin <mfroomki@umiami.ir.miami.edu>”
1995-09-10 (Sat, 9 Sep 95 22:33:22 PDT) - Dishonest banks & ecash - Michael Froomkin <mfroomki@umiami.ir.miami.edu>