From: phelix@vallnet.com
To: cypherpunks@Algebra.COM
Message Hash: 3c5388a36ce9c03fd20af3293de8f4b85965ee08ab36ba44e50a2885b9a4fb0e
Message ID: <34b9a145.15127288@128.2.84.191>
Reply To: <34B9327A.2AAEEF87@ix.netcom.com>
UTC Datetime: 1998-01-12 06:03:54 UTC
Raw Date: Mon, 12 Jan 1998 14:03:54 +0800
From: phelix@vallnet.com
Date: Mon, 12 Jan 1998 14:03:54 +0800
To: cypherpunks@Algebra.COM
Subject: Re: (eternity) mailing list and activity
In-Reply-To: <34B9327A.2AAEEF87@ix.netcom.com>
Message-ID: <34b9a145.15127288@128.2.84.191>
MIME-Version: 1.0
Content-Type: text/plain
On 11 Jan 1998 18:48:24 -0600, Adam Back <aba@dcs.ex.ac.uk> wrote:
>Wei Dai suggested that documents should be secret split in a redundant
>fashion so that say 2 of 5 shares are required to reconstruct the
>document. If the shares are distributed across different servers,
>this ensures that one server does not directly hold the information.
What prevents the operator of such a server from being charged with
"conspiracy to provide child porn" or whatever? If he is holding a portion
of such contraband, isn't he as liable as if he was holding the whole
article(s)?
-- Phelix
Return to January 1998
Return to “Tim May <tcmay@got.net>”