1996-05-07 - Re: CryptoAnarchy: What’s wrong with this picture?

Header Data

From: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
To: unicorn@schloss.li
Message Hash: 81bd5e7e0fa23a4d37f9aefd9bfb5d472edc20124b314451b7253526da8593f5
Message ID: <01I4DYNHXPW28Y583T@mbcl.rutgers.edu>
Reply To: N/A
UTC Datetime: 1996-05-07 02:45:00 UTC
Raw Date: Tue, 7 May 1996 10:45:00 +0800

Raw message

From: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Date: Tue, 7 May 1996 10:45:00 +0800
To: unicorn@schloss.li
Subject: Re: CryptoAnarchy: What's wrong with this picture?
Message-ID: <01I4DYNHXPW28Y583T@mbcl.rutgers.edu>
MIME-Version: 1.0
Content-Type: text/plain


From:	IN%"unicorn@schloss.li"  "Black Unicorn" 29-APR-1996 02:21:27.65
To:	IN%"jimbell@pacifier.com"  "jim bell"
CC:	IN%"cypherpunks@toad.com"  "Cypherpunks"
Subj:	RE: CryptoAnarchy: What's wrong with this picture?

Received: from toad.com by mbcl.rutgers.edu (PMDF #12194) id
 <01I43INDKHI88WWLV8@mbcl.rutgers.edu>; Mon, 29 Apr 1996 02:18 EDT
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id TAA27441 for
 cypherpunks-outgoing; Sun, 28 Apr 1996 19:17:23 -0700 (PDT)
Received: from polaris.mindport.net (unicorn@polaris.mindport.net
 [205.219.167.2]) by toad.com (8.7.5/8.7.3) with SMTP id TAA27428 for
 <cypherpunks@toad.com>; Sun, 28 Apr 1996 19:17:12 -0700 (PDT)
Received: from localhost (unicorn@localhost) by polaris.mindport.net
 (8.6.12/8.6.12) with SMTP id AAA07591; Mon, 29 Apr 1996 00:15:56 -0400
Date: Mon, 29 Apr 1996 00:15:56 -0400 (EDT)
From: Black Unicorn <unicorn@schloss.li>
Subject: RE: CryptoAnarchy: What's wrong with this picture?
In-reply-to: <m0uDagf-00093GC@pacifier.com>
Sender: owner-cypherpunks@toad.com
To: jim bell <jimbell@pacifier.com>
Cc: Cypherpunks <cypherpunks@toad.com>
Reply-to: Black Unicorn <unicorn@schloss.li>
Message-id: <Pine.SUN.3.93.960428234342.5923A-100000@polaris.mindport.net>
X-Envelope-to: eallensmith
Content-type: TEXT/PLAIN; charset=US-ASCII
Posted-Date: Mon, 29 Apr 1996 00:15:56 -0400
X-Sender: unicorn@polaris.mindport.net
MIME-Version: 1.0
Precedence: bulk

On Sun, 28 Apr 1996, jim bell wrote:

[...]

>While strong cryptography is powerful, and secure communications
>liberating, unplugging the phones would about cripple that 'weapon' for a
>while.  Any group rebelling based only on high technology communication is
>an extremely vulnerable group, both to widespread denial of service, and
>more specific 'surgical' attacks.  (Motorola stock anyone?)

	Wouldn't that partially depend on:
		A. the level of backups - packet radio as a backup for phones,
for instance... a reason I've been forwarding the stuff on radio to here.
		B. the necessity to the government of keeping what else may
depend on those phones - the economy - going.
	-Allen





Thread