From: Jonathan Wienke <JonWienk@ix.netcom.com>
To: Ryan Lackey <rdl@MIT.EDU>
Message Hash: c3bcea2b0361f1e92063d4c4f870e4b11caed552fe7d4831cc3a11946e2f62a7
Message ID: <3.0.3.32.19980116113405.006a44e8@popd.netcruiser>
Reply To: <Jim Choate’s message of Wed, 14 Jan 1998 09:32:54 -0600 (CST)>
UTC Datetime: 1998-01-16 23:17:04 UTC
Raw Date: Sat, 17 Jan 1998 07:17:04 +0800
From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Sat, 17 Jan 1998 07:17:04 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: how to release code if the programmer is a target for coercion (fwd)
In-Reply-To: <Jim Choate's message of Wed, 14 Jan 1998 09:32:54 -0600 (CST)>
Message-ID: <3.0.3.32.19980116113405.006a44e8@popd.netcruiser>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 01:41 AM 1/15/98 -0500, Ryan Lackey wrote:
>Another attack would be having 5 NSA agents sign a piece of code, but
>you could prevent that by having the list made up of distinct well known
>individuals who are unlikely to all be bought -- if the NSA wants to
>give $100m each to the most frequent 100 posters on cypherpunks, I want
>to get in line :)
You can have cuts right behind me!
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5
iQA/AwUBNL+2K8JF0kXqpw3MEQK5vgCdH8N7F7fyTkrWn1E+mBhznrIDqZwAnjpG
xE2ngJSG0BZJ4crdJb6EAYm8
=huFc
-----END PGP SIGNATURE-----
Return to January 1998
Return to “Jonathan Wienke <JonWienk@ix.netcom.com>”
Unknown thread root