From: “Peter D. Junger” <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: 6f3e52782cdd62f195fd6431a896fc917164dd9c731dadb0732dd1e290fe98e0
Message ID: <199607290044.UAA00896@pdj2-ra.F-REMOTE.CWRU.Edu>
Reply To: <199607282047.NAA28494@toad.com>
UTC Datetime: 1996-07-29 02:56:50 UTC
Raw Date: Mon, 29 Jul 1996 10:56:50 +0800
From: "Peter D. Junger" <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
Date: Mon, 29 Jul 1996 10:56:50 +0800
To: Cypherpunks <cypherpunks@toad.com>
Subject: Re: Feinstein wants controls on Internet, Books
In-Reply-To: <199607282047.NAA28494@toad.com>
Message-ID: <199607290044.UAA00896@pdj2-ra.F-REMOTE.CWRU.Edu>
MIME-Version: 1.0
Content-Type: text/plain
Bill Stewart writes:
: Now, there are subtleties to building them that may require
: some amount of thought, rather than being totally obvious to the builder,
: and there are things that are obvious but are difficult to do.
:
: For instance, say you, hypothetically, wanted to blow up your government's
: legislative building. You'd obviously want to pick a dark and stormy night,
: say early in November, and you'd sneak into the basement with barrels
: of gunpowder. You'd use a long, slow-burning fuse, so it would blow up
: the next day when they're in session, but after lighting it you'd still
: run away very fast just in case your fuse speeds up on you. The obvious
: thing you'd need to do is to NOT GET CAUGHT LIKE THE LAST FOOL WHO TRIED IT.
: However, if you do get caught, maybe you'll end up with your name in lights
: and people will set off firecrackers in your honor every fall,
: while if you don't get caught you won't be personally famous. Tough choice:-)
:
: Penny for the Guy?
Did the old Guy and his co-conspirators use crypto?
--
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
Internet: junger@pdj2-ra.f-remote.cwru.edu junger@samsara.law.cwru.edu
Return to July 1996
Return to ““Peter D. Junger” <junger@pdj2-ra.F-REMOTE.CWRU.Edu>”