From: bennett_t1@popmail.firn.edu
To: cypherpunks@toad.com
Message Hash: 954fde96f429ed107e591d780d91ed34c26021dfde12828c009b5c5602eb1e32
Message ID: <3.0.2.32.19970815131306.007e3790@popmail.firn.edu>
Reply To: <199708151634.SAA11624@basement.replay.com>
UTC Datetime: 1997-08-15 17:30:57 UTC
Raw Date: Sat, 16 Aug 1997 01:30:57 +0800
From: bennett_t1@popmail.firn.edu
Date: Sat, 16 Aug 1997 01:30:57 +0800
To: cypherpunks@toad.com
Subject: Re: Reducing Crypto-Anonymous Crime by 50%
In-Reply-To: <199708151634.SAA11624@basement.replay.com>
Message-ID: <3.0.2.32.19970815131306.007e3790@popmail.firn.edu>
MIME-Version: 1.0
Content-Type: text/plain
At 06:34 PM 8/15/97 +0200, you wrote:
> An analysis of the cypherpunks list archives shows that most of
>the undesirable activities being perpetrated in the crypto-anonymity
>arena are the result of a conspiracy between Alice, Bob, and their
>shady friends.
> Anybody know their last names?
I believe Bob's is Barker, and Alice's full is:
Alice N. Wonderland.
Sorry, couldn't resist.
/===========================================================\
Help win the fight against weak encryption! Break RC5-56
-----------|> http://rc5.distributed.net/ <|-------------
Member of Starbase XII RC5 Team
\===========================================================/
Return to August 1997
Return to “nobody@REPLAY.COM (Anonymous)”