From: “Mark M.” <markm@voicenet.com>
To: cypherpunks@toad.com
Message Hash: 8dea89aa7a725a50a5dddecbac8448f74804da17d619fe0cae8b31129384ba30
Message ID: <Pine.LNX.3.95.961109150431.676B-100000@gak.voicenet.com>
Reply To: <9610098475.AA847591051@smtp-gw.cv62.navy.mil>
UTC Datetime: 1996-11-09 20:09:09 UTC
Raw Date: Sat, 9 Nov 1996 12:09:09 -0800 (PST)
From: "Mark M." <markm@voicenet.com>
Date: Sat, 9 Nov 1996 12:09:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: allow me to state the obvious....
In-Reply-To: <9610098475.AA847591051@smtp-gw.cv62.navy.mil>
Message-ID: <Pine.LNX.3.95.961109150431.676B-100000@gak.voicenet.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
On Sat, 9 Nov 1996 SUCRUM22_at_INDY-ADP@smtp-gw.cv62.navy.mil wrote:
> i am your average joe who uses the computer for work and e-mail and the
> occasional jaunt into the internet. going along reading this whole
> crypto-anarchy thing makes me want to cry. the whole point of cryptography
> is getting info from my eyes to yours. period. you can say that "illegal"
> information passes along the internet, but hello people - illegalities have
> been going on since long before the invention of the computer (or even the
> notion of cryptography - if i may stop to point out the obvious). the only
> reason _i_ use encrypted stuff is because i don't want my nosy sysadmin
> reading my mail. its that simple. think about it. how many times is your
Plain cryptography isn't the main point. The protocols (such as anonymous
digital cash, message pools, DC-nets, etc.) allow things to exist that are
not possible without cryptography. These protocols make laws (especially
victimless laws) much more difficult to enforce.
> e-mail handed off? when sent it naturally follows the most convenient path
> to its destination, and even anonymous re-mailers (can) keep a hard copy of
> the messages that cross their connections with the original address
> included. you can go off into spoofing address and so on, but your average
> joe may (or may not) have the time or knowledge (much less the motivation)
> to do that. keep that in mind before you go saying that crypto is a
> good/bad thing.
In order for anonymous remailers to be completely anonymous, only one remailer
in the chain has to be trustworthy. If a message is chained through N
remailers and N-1 of those remailers are run by spooks, the anonymity of the
message depends on the remaining remailer.
Mark
- --
finger -l for PGP key
PGP encrypted mail prefered.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3
Charset: noconv
iQEVAwUBMoTlLyzIPc7jvyFpAQEXGQf/VN8uNK7+uUWdNqcip2dHkPVFLjZlItBf
dcilb36/zBJikX1XIOHbk15X/s4N/bM1WfAAYqPikI7jfcVkbxw0j0gTwVTYY1Wu
AbbdAh1o47CYe55eqEhcirfQQEMMHaZ/7DXKj+mdDeBWACZqHbOmx25spChH0fi+
3i3AhF23kBNxb4H/MNLTA9Fb6mzGsGsXmzDEJHnVPxQQG8uUQcBd6qVkBdLu05++
YYV60gr2vXb5LCLgIbhzT3Q/pFC2k2wkh9Wn+V+FgU1SwJleMWNOcY1nuU4ylND4
EncDq44AlWpt54fzu96saOz1DZgczyTaLnM2ZktywsH43WQ00eVw8A==
=7FDt
-----END PGP SIGNATURE-----
Return to November 1996
Return to ““William F. Towey” <liam@webspan.net>”