From: owner-cypherpunks@toad.com
To: N/A
Message Hash: c5fbb5a382d32ad7957259162e46eb77ef765ebeea0bf523e4d7516b1308c207
Message ID: <QQachh06884.199602100929@relay3.UU.NET>
Reply To: N/A
UTC Datetime: 1996-02-10 09:40:28 UTC
Raw Date: Sat, 10 Feb 1996 17:40:28 +0800
From: owner-cypherpunks@toad.com
Date: Sat, 10 Feb 1996 17:40:28 +0800
Subject: No Subject
Message-ID: <QQachh06884.199602100929@relay3.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain
I put I time line I've been keeping for my own reference up at:
http://rpcp.mit.edu/~reagle/commerce/line.html
> --> The following is an extension of a timeline detailing the protocol
> battles for Internet side credit card encryption and "processing" that
> was an appendix of a paper Brett Leida and myself wrote. (One day it
> will be on-line, as you can see, our argument that Visa/MC should
> cooperate was a good one!)]
>
> I'll add to it as time goes on, and hopefully updates should find
> there way to the web server eventually.
>
> I tried to provide the best reference I could, you can try to email me
> if you need more info...
>
>
_______________________
Regards, Talent develops in tranquillity, character in the
full current of human life. -Goethe
Joseph Reagle http://farnsworth.mit.edu/~reagle/home.html
reagle@mit.edu 0C 69 D4 E8 F2 70 24 33 B4 5E 5E EC 35 E6 FB 88
Return to February 1996
Return to “owner-cypherpunks@toad.com”
1996-02-10 (Sat, 10 Feb 1996 17:40:28 +0800) - No Subject - owner-cypherpunks@toad.com