From: jim bell <jimbell@pacifier.com>
To: Igor Chudov <ichudov@algebra.com>
Message Hash: 6e1e8cd1122e654195b1c9b41a99d70745f2bfa7f1566af5ac359ec92c07e224
Message ID: <199701302013.MAA14609@toad.com>
Reply To: N/A
UTC Datetime: 1997-01-30 20:13:16 UTC
Raw Date: Thu, 30 Jan 1997 12:13:16 -0800 (PST)
From: jim bell <jimbell@pacifier.com>
Date: Thu, 30 Jan 1997 12:13:16 -0800 (PST)
To: Igor Chudov <ichudov@algebra.com>
Subject: Re: Fighting the cybercensor
Message-ID: <199701302013.MAA14609@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
At 01:03 AM 1/28/97 -0600, Igor Chudov @ home wrote:
>jim bell wrote:
>>
>> At 10:21 PM 1/26/97 -0800, blanc wrote:
>> >From: jim bell (in response to Dimitri Vulis')
>> >Look, I've proposed what I consider to be a remarkably consistent method to
>> >prevent the kind of political tyranny that you criticize, and I don't see
>> >any recognition of this fact.
>> >........................................................
>> >
>> >1) Jim, why do you insist on discussing this on an forum for encryption?
>>
>> Because it's on-topic, that's why. Because it's not merely a list
>> concerning METHODS of encryption, it's also about the _reasons_ for using
>> encryption, as well as the _effects_ (both small-scale and large-scale) of
>> using encryption.
>
>Actually AP is one of the more interesting topics here. I think that there
>is a clear need for an AP bot.
>
>Do you feel like writing it?
Desire? Yes. Ability? Maybe. Time? No.
Jim Bell
jimbell@pacifier.com
Return to January 1997
Return to “jim bell <jimbell@pacifier.com>”
1997-01-30 (Thu, 30 Jan 1997 12:13:16 -0800 (PST)) - Re: Fighting the cybercensor - jim bell <jimbell@pacifier.com>