From: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
To: unicorn@schloss.li
Message Hash: 81bd5e7e0fa23a4d37f9aefd9bfb5d472edc20124b314451b7253526da8593f5
Message ID: <01I4DYNHXPW28Y583T@mbcl.rutgers.edu>
Reply To: N/A
UTC Datetime: 1996-05-07 02:45:00 UTC
Raw Date: Tue, 7 May 1996 10:45:00 +0800
From: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Date: Tue, 7 May 1996 10:45:00 +0800
To: unicorn@schloss.li
Subject: Re: CryptoAnarchy: What's wrong with this picture?
Message-ID: <01I4DYNHXPW28Y583T@mbcl.rutgers.edu>
MIME-Version: 1.0
Content-Type: text/plain
From: IN%"unicorn@schloss.li" "Black Unicorn" 29-APR-1996 02:21:27.65
To: IN%"jimbell@pacifier.com" "jim bell"
CC: IN%"cypherpunks@toad.com" "Cypherpunks"
Subj: RE: CryptoAnarchy: What's wrong with this picture?
Received: from toad.com by mbcl.rutgers.edu (PMDF #12194) id
<01I43INDKHI88WWLV8@mbcl.rutgers.edu>; Mon, 29 Apr 1996 02:18 EDT
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id TAA27441 for
cypherpunks-outgoing; Sun, 28 Apr 1996 19:17:23 -0700 (PDT)
Received: from polaris.mindport.net (unicorn@polaris.mindport.net
[205.219.167.2]) by toad.com (8.7.5/8.7.3) with SMTP id TAA27428 for
<cypherpunks@toad.com>; Sun, 28 Apr 1996 19:17:12 -0700 (PDT)
Received: from localhost (unicorn@localhost) by polaris.mindport.net
(8.6.12/8.6.12) with SMTP id AAA07591; Mon, 29 Apr 1996 00:15:56 -0400
Date: Mon, 29 Apr 1996 00:15:56 -0400 (EDT)
From: Black Unicorn <unicorn@schloss.li>
Subject: RE: CryptoAnarchy: What's wrong with this picture?
In-reply-to: <m0uDagf-00093GC@pacifier.com>
Sender: owner-cypherpunks@toad.com
To: jim bell <jimbell@pacifier.com>
Cc: Cypherpunks <cypherpunks@toad.com>
Reply-to: Black Unicorn <unicorn@schloss.li>
Message-id: <Pine.SUN.3.93.960428234342.5923A-100000@polaris.mindport.net>
X-Envelope-to: eallensmith
Content-type: TEXT/PLAIN; charset=US-ASCII
Posted-Date: Mon, 29 Apr 1996 00:15:56 -0400
X-Sender: unicorn@polaris.mindport.net
MIME-Version: 1.0
Precedence: bulk
On Sun, 28 Apr 1996, jim bell wrote:
[...]
>While strong cryptography is powerful, and secure communications
>liberating, unplugging the phones would about cripple that 'weapon' for a
>while. Any group rebelling based only on high technology communication is
>an extremely vulnerable group, both to widespread denial of service, and
>more specific 'surgical' attacks. (Motorola stock anyone?)
Wouldn't that partially depend on:
A. the level of backups - packet radio as a backup for phones,
for instance... a reason I've been forwarding the stuff on radio to here.
B. the necessity to the government of keeping what else may
depend on those phones - the economy - going.
-Allen
Return to May 1996
Return to ““E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>”