1996-10-15 - RE: Re: extortion via digital cash

Header Data

From: scottb@aca.ca
To: <cypherpunks@toad.com>
Message Hash: 026d1ad2dafdb4725616ab4d7c67475d32375c51bf1d590eb3254f74b608f1f5
Message ID: <96Oct15.151831edt.15382-3@gateway.aca.ca>
Reply To: N/A
UTC Datetime: 1996-10-15 19:19:11 UTC
Raw Date: Tue, 15 Oct 1996 12:19:11 -0700 (PDT)

Raw message

From: scottb@aca.ca
Date: Tue, 15 Oct 1996 12:19:11 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: RE:  Re: extortion via digital cash
Message-ID: <96Oct15.151831edt.15382-3@gateway.aca.ca>
MIME-Version: 1.0
Content-Type: text/plain




 ----------
>From: azur
>Subject:  Re: extortion via digital cash
>Date: Tuesday, October 15, 1996 2:18PM
>
<SNIP>

>Although Digicash's ecash offers anonymity to the payor it does not to the
>payee.  The reasons have to do with the way coins are blinded.  So LE
>could, with the bank's cooperation, easily associate the two sides of a
>transaction.  This was intentional on Chaum's part, either for moral or
>practical political considerations.  Its probably only a relatively minor
>patch to allow one ecash purse (the kidnapper's) to generate the blind
>token values so that another (similarly patched) purse (the vicitim's) can
>submit them to the mint and return the minted coins to the kidnapper (e.g.,
>by posting on a popular Usenet group).  In this scenario the only
>reasonable way left to track the money is via linkage (the size and timing
>of deposits and withdrawls in the kidnapper's account).

I would tend to think that if you held on to the money long enough, you 
would
thwart them tracking it via linkage-especially once it becomes more 
commonplace
to do electronic transactions on the Net.  Actually, if you wait long 
enough, you
likely will  run the risk of there being a crackdown on nym servers, 
remailers, etc, and
maybe even specialy designed cancel-bots on usenet.

/sb 





Thread