1996-11-18 - Re: POC_ket

Header Data

From: “Timothy C. May” <tcmay@got.net>
To: John Young <cypherpunks@toad.com
Message Hash: 5d1604897e9fb893288a85d6625bb969c2049d34ada32fe8f16f8417e5d575df
Message ID: <v03007803aeb669e1c21e@[207.167.93.63]>
Reply To: <1.5.4.32.19961118164214.006e9e00@pop.pipeline.com>
UTC Datetime: 1996-11-18 19:34:40 UTC
Raw Date: Mon, 18 Nov 1996 11:34:40 -0800 (PST)

Raw message

From: "Timothy C. May" <tcmay@got.net>
Date: Mon, 18 Nov 1996 11:34:40 -0800 (PST)
To: John Young <cypherpunks@toad.com
Subject: Re: POC_ket
In-Reply-To: <1.5.4.32.19961118164214.006e9e00@pop.pipeline.com>
Message-ID: <v03007803aeb669e1c21e@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain


At 11:42 AM -0500 11/18/96, John Young wrote:
>WaJo reports today on IBM's tiny pocket computer that
>transmits data through the body -- to another body or to
>a device such as a telephone. Invented by Tom Zimmerman,
>formerly of the Media Lab, it can tell "anything you touch
>who you are." Being shown at Comdex.


Brings new meaning to "Reach out and touch someone."


To make some crypto points, I watched the H-P/Intel/Microsoft CFT press
conference...the Intel guy, Ron Smith, was someone I worked with several
times in the 1980s.

One of the very troubling concerns is the blithe acceptance by all
commentators I saw on how natural it is that "policy cards" would be based
on whatever governments decided was OK. No libertarian or anarchist views
were heard. It was just sort of tacitly accepted that if, for example,
Saudi Arabia wanted to ensure that women could not use the new system, an
appropriate policy card would be denied to women, and that card vendors
would set the gender bit appropriately.

(This was not an example used, but it of course is a reasonable example of
what Muslim countries will do....not to start a flame war, these comments,
but just to point out that many or even most uses of "policy cards" will be
for uses we in the West consider unacceptable.)

I'm also very concerned that ubiquitous use of CFT means a shift to
"machine-centric" key models. Instead of being able to have ephemeral
public keys for various uses, the model assumes basically a simple
machine-to-machine communications model. "Throwaway keys" are not likely.

Now the issue is going to be to what extent the CFT technology displaces
other models, or even whether non-policy card models are restricted or
banned.

--Tim May

"The government announcement is disastrous," said Jim Bidzos,.."We warned IBM
that the National Security Agency would try to twist their technology."
[NYT, 1996-10-02]
We got computers, we're tapping phone lines, I know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1,257,787-1 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









Thread