From: Tim May <tcmay@got.net>
To: Adam Back <Markus.Kuhn@cl.cam.ac.uk
Message Hash: 744bc8c9392ef30097984b52fd60f55c84beac0c29d6d6d9eb375f28c59126f0
Message ID: <v03102803b106476925d8@[207.167.93.63]>
Reply To: <E0y1wKR-00084W-00@heaton.cl.cam.ac.uk>
UTC Datetime: 1998-02-10 18:16:31 UTC
Raw Date: Wed, 11 Feb 1998 02:16:31 +0800
From: Tim May <tcmay@got.net>
Date: Wed, 11 Feb 1998 02:16:31 +0800
To: Adam Back <Markus.Kuhn@cl.cam.ac.uk
Subject: Narcware
In-Reply-To: <E0y1wKR-00084W-00@heaton.cl.cam.ac.uk>
Message-ID: <v03102803b106476925d8@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain
At 1:34 PM -0800 2/9/98, Adam Back wrote:
>I am not sure I want to see my computer narcing out over RF
>frequencies what software is installed -- once enabled for corporates
Why not monkeywrench the narcware to narc out falsely?
Imagine 100 copies of a program all screaming "Bill Gates"!
(ObCrypto: One can imagine methods to broadcast a new signifier each time a
program is started...some kind of zero knowledge approach. But this gets
difficult when the broadcast program is under the control of those trying
to defeat the system. A well known problem. E.g., if N copies are all
identical, and the ZKIPS approach is generated in software, the N copies
will overlap signals. And so on. I expect the Anderson-Kuhn approach
broadcasts a single identifier, though I have not yet had time to look at
their paper, so I may be wrong here.)
Narcware will face a lot of customer resistance.
--Tim May
Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^3,021,377 | black markets, collapse of governments.
Return to February 1998
Return to ““WebWarrior3@InfoWar.Com” <WebWarrior3@InfoWar.Com>”