From: Tom Weinstein <tomw@netscape.com>
To: cypherpunks@toad.com
Message Hash: b53158ecbbb381518e099a32a8057b174aead757a7c8972bc51729214b669e9d
Message ID: <3183E853.41C6@netscape.com>
Reply To: <199604272256.PAA02672@netcom20.netcom.com>
UTC Datetime: 1996-04-29 03:51:37 UTC
Raw Date: Mon, 29 Apr 1996 11:51:37 +0800
From: Tom Weinstein <tomw@netscape.com>
Date: Mon, 29 Apr 1996 11:51:37 +0800
To: cypherpunks@toad.com
Subject: Re: Mindshare and Java
In-Reply-To: <199604272256.PAA02672@netcom20.netcom.com>
Message-ID: <3183E853.41C6@netscape.com>
MIME-Version: 1.0
Content-Type: text/plain
Rich Graves wrote:
>
> Some of the things a valid signature from Jack the Ripper means:
>
> 1. If it breaks something, I can send Jack the Ripper a bug report, or
> a flame, as appropriate.
> 2. If I like it, I can send Jack the Ripper money or other form of
> good vibes.
> 6. I have a way of knowing if Alice or Bob stuck a virus or trojan
> into Jack's code.
Yep, these are true.
> 3. If I am Jack the Ripper, I have a way of proving that the code is
> my intellectual property.
How do you prove that? If I strip off your signature and sign it
myself, how do you know it's yours?
> 4. If I'm not Jack the Ripper, I can say "That wasn't me."
No you can't. How do I know that Jack isn't a nym of yours?
> 5. If I am GNU, I can advertise and "enforce" my copyleft policy.
How?
--
Sure we spend a lot of money, but that doesn't mean | Tom Weinstein
we *do* anything. -- Washington DC motto | tomw@netscape.com
Return to April 1996
Return to ““Vladimir Z. Nuri” <vznuri@netcom.com>”