1996-02-02 - End-to-End Encryption

Header Data

From: tcmay@got.net (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: 3a307caf4710708037e60e797524c7c094a56fea2ec9abd2283515c4f5af7b35
Message ID: <ad378ca712021004c83e@[205.199.118.202]>
Reply To: N/A
UTC Datetime: 1996-02-02 18:11:54 UTC
Raw Date: Sat, 3 Feb 1996 02:11:54 +0800

Raw message

From: tcmay@got.net (Timothy C. May)
Date: Sat, 3 Feb 1996 02:11:54 +0800
To: cypherpunks@toad.com
Subject: End-to-End Encryption
Message-ID: <ad378ca712021004c83e@[205.199.118.202]>
MIME-Version: 1.0
Content-Type: text/plain


At 4:57 PM 2/2/96, Anonymous wrote:

>Is there technology for eluding these espionage-enabled
>chokepoints -- tunneling, satellite-richochet or
>otherwise?

End-to-end encryption.

So long as users can do end-to-end encryption, at various levels (that is,
end users use things like PGP, other levels use things like SWIPE or
PipeNet, etc.), what surveillance organizations do to monitor channels is
not so critical.

And remailers and proxies make traffic analysis less possible.

--Tim May

Boycott espionage-enabled software!
We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1  | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









Thread