1996-12-20 - Re: Executing Encrypted Code

Header Data

From: “Timothy C. May” <tcmay@got.net>
To: cypherpunks@toad.com
Message Hash: e67d15bb0277161644e1d0a4ee6fefd45a3f6706362bc6e98f7f9a617a221cf9
Message ID: <v03007801aedfc6824d72@[]>
Reply To: <v02140b02aedfb5d9a7f2@[]>
UTC Datetime: 1996-12-20 04:05:40 UTC
Raw Date: Thu, 19 Dec 1996 20:05:40 -0800 (PST)

Raw message

From: "Timothy C. May" <tcmay@got.net>
Date: Thu, 19 Dec 1996 20:05:40 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Executing Encrypted Code
In-Reply-To: <v02140b02aedfb5d9a7f2@[]>
Message-ID: <v03007801aedfc6824d72@[]>
MIME-Version: 1.0
Content-Type: text/plain

At 7:34 PM -0800 12/19/96, Peter Hendrickson wrote:

>You could also timestamp the software so that it only runs for a given
>length of time.  This will encourage people to upgrade regularly.  ;-)

Or to reset their clocks. Which is what many of us do when software is
about to "expire."

(The issue of enforcing "digital time delays" is an interesting one.
Usually this necessitates some variant of "beacons," presumably on the Net,
as the local clock can of course not be trusted or counted upon to be
accurate. I wrote a couple of articles on this several years ago...I'll see
if I can find them if there's interest.)

--Tim May

Just say "No" to "Big Brother Inside"
We got computers, we're tapping phone lines, I know that that ain't allowed.
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."