1998-01-12 - Re: (eternity) mailing list and activity

Header Data

From: phelix@vallnet.com
To: cypherpunks@Algebra.COM
Message Hash: 3c5388a36ce9c03fd20af3293de8f4b85965ee08ab36ba44e50a2885b9a4fb0e
Message ID: <34b9a145.15127288@128.2.84.191>
Reply To: <34B9327A.2AAEEF87@ix.netcom.com>
UTC Datetime: 1998-01-12 06:03:54 UTC
Raw Date: Mon, 12 Jan 1998 14:03:54 +0800

Raw message

From: phelix@vallnet.com
Date: Mon, 12 Jan 1998 14:03:54 +0800
To: cypherpunks@Algebra.COM
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <34B9327A.2AAEEF87@ix.netcom.com>
Message-ID: <34b9a145.15127288@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain



On 11 Jan 1998 18:48:24 -0600, Adam Back <aba@dcs.ex.ac.uk> wrote:

>Wei Dai suggested that documents should be secret split in a redundant
>fashion so that say 2 of 5 shares are required to reconstruct the
>document.  If the shares are distributed across different servers,
>this ensures that one server does not directly hold the information.

What prevents the operator of such a server from being charged with
"conspiracy to provide child porn" or whatever?  If he is holding a portion
of such contraband, isn't he as liable as if he was holding the whole
article(s)?

-- Phelix






Thread