From: scottb@aca.ca
To: <cypherpunks@toad.com>
Message Hash: 026d1ad2dafdb4725616ab4d7c67475d32375c51bf1d590eb3254f74b608f1f5
Message ID: <96Oct15.151831edt.15382-3@gateway.aca.ca>
Reply To: N/A
UTC Datetime: 1996-10-15 19:19:11 UTC
Raw Date: Tue, 15 Oct 1996 12:19:11 -0700 (PDT)
From: scottb@aca.ca
Date: Tue, 15 Oct 1996 12:19:11 -0700 (PDT)
To: <cypherpunks@toad.com>
Subject: RE: Re: extortion via digital cash
Message-ID: <96Oct15.151831edt.15382-3@gateway.aca.ca>
MIME-Version: 1.0
Content-Type: text/plain
----------
>From: azur
>Subject: Re: extortion via digital cash
>Date: Tuesday, October 15, 1996 2:18PM
>
<SNIP>
>Although Digicash's ecash offers anonymity to the payor it does not to the
>payee. The reasons have to do with the way coins are blinded. So LE
>could, with the bank's cooperation, easily associate the two sides of a
>transaction. This was intentional on Chaum's part, either for moral or
>practical political considerations. Its probably only a relatively minor
>patch to allow one ecash purse (the kidnapper's) to generate the blind
>token values so that another (similarly patched) purse (the vicitim's) can
>submit them to the mint and return the minted coins to the kidnapper (e.g.,
>by posting on a popular Usenet group). In this scenario the only
>reasonable way left to track the money is via linkage (the size and timing
>of deposits and withdrawls in the kidnapper's account).
I would tend to think that if you held on to the money long enough, you
would
thwart them tracking it via linkage-especially once it becomes more
commonplace
to do electronic transactions on the Net. Actually, if you wait long
enough, you
likely will run the risk of there being a crackdown on nym servers,
remailers, etc, and
maybe even specialy designed cancel-bots on usenet.
/sb
Return to October 1996
Return to “scottb@aca.ca”
1996-10-15 (Tue, 15 Oct 1996 12:19:11 -0700 (PDT)) - RE: Re: extortion via digital cash - scottb@aca.ca