From: owner-cypherpunks@toad.com
To: N/A
Message Hash: 4f0ce9c81fa851a85427f250ce635a2e9c8f09e9a2fd2a61f463bc4aca7f34e2
Message ID: <QQadvz22049.199602210955@relay3.UU.NET>
Reply To: N/A
UTC Datetime: 1996-02-21 09:58:26 UTC
Raw Date: Wed, 21 Feb 1996 17:58:26 +0800
From: owner-cypherpunks@toad.com
Date: Wed, 21 Feb 1996 17:58:26 +0800
Subject: No Subject
Message-ID: <QQadvz22049.199602210955@relay3.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, 21 Feb 1996, Tim Philp wrote:
> The issue that I have not seen you address is one that has been
> brought up by several posters to this thread. This issue has to do with
> the fact that if you generate all of the keys (or whatever) what is to
> stop someone from offering one of your employees a LARGE bribe to cough up
> the keys?
Not to mention GAK. No bribe needed - just a "suit" showing up with what
looks like a court order.
--
Ed Carp, N7EKG Ed.Carp@linux.org, ecarp@netcom.com
214/993-3935 voicemail/digital pager
800/558-3408 SkyPager
Finger ecarp@netcom.com for PGP 2.5 public key an88744@anon.penet.fi
"Past the wounds of childhood, past the fallen dreams and the broken families,
through the hurt and the loss and the agony only the night ever hears, is a
waiting soul. Patient, permanent, abundant, it opens its infinite heart and
asks only one thing of you ... 'Remember who it is you really are.'"
-- "Losing Your Mind", Karen Alexander and Rick Boyes
The mark of a good conspiracy theory is its untestability.
-- Andrew Spring
Return to February 1996
Return to “owner-cypherpunks@toad.com”
1996-02-21 (Wed, 21 Feb 1996 17:58:26 +0800) - No Subject - owner-cypherpunks@toad.com