1996-01-25 - Re: Signing nyms’ keys (Was: Report on Portland Cpunks…)

Header Data

From: jim bell <jimbell@pacifier.com>
To: Alan Olsen <cypherpunks@toad.com
Message Hash: 262f10ba5a288c0aa1b7fd1e53030db75a7d4a2f49f5918b0c20871810a5adfa
Message ID: <m0tfLsC-00093jC@pacifier.com>
Reply To: N/A
UTC Datetime: 1996-01-25 09:27:00 UTC
Raw Date: Thu, 25 Jan 1996 17:27:00 +0800

Raw message

From: jim bell <jimbell@pacifier.com>
Date: Thu, 25 Jan 1996 17:27:00 +0800
To: Alan Olsen <cypherpunks@toad.com
Subject: Re: Signing nyms' keys (Was: Report on Portland Cpunks...)
Message-ID: <m0tfLsC-00093jC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain


At 06:49 PM 1/24/96 -0800, Alan Olsen wrote:

>Person X commits treasonable act A.  All of the persons who are signed on to
>his key could be considered to be co-conspirators.  The same applies to
>nyms.  The difficulty with prosecuting nyms is finding the link to the real
>world individual.  Anyone associated with him/her/it will be considered to
>be guilty by reason of key signage or a way of determining who the real
>person is...
>
>The only way I see getting around this is only signing nyms with nyms or
>having some sort of zero knowlege proof on a key signing authority.
>Something where you can issue some sort of proof to the signing authority
>that you are who you say you are without giving any information about your
>"real" identity.  I know of no foolproof way of doing this...
>
>I guess we are stuck with the "Web of Guilt"...

Doesn't all this stuff give you a headache <G>?






Thread