From: John Young <jya@pipeline.com>
To: cypherpunks@cyberpass.net
Message Hash: ac206d821fbb91522c5194731d0fbd24db7133865275f7cde1b1ff95b8b7b42b
Message ID: <199809071546.LAA21825@camel7.mindspring.com>
Reply To: <v03130307b218f992deb9@[209.66.100.36]>
UTC Datetime: 1998-09-07 15:47:28 UTC
Raw Date: Mon, 7 Sep 1998 23:47:28 +0800
From: John Young <jya@pipeline.com>
Date: Mon, 7 Sep 1998 23:47:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
In-Reply-To: <v03130307b218f992deb9@[209.66.100.36]>
Message-ID: <199809071546.LAA21825@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain
It would be fitting for this list to be distinguished as
the place where crypto-in-a-crime was first committed.
What might that be? A match of the crime committed
to prevent widespread strong crypto?
Crypto-criminal anonymity in the national interest (governmental
secrecy) fighting to prevent crypto-criminal anonymity in the
public interest (private secrecy).
This is not a troll, but query on what could be done to to tip the
hand and identify those unnamed who are most fearful of strong
cryptography, not their public rougers in the 3 divs of gov.
Return to September 1998
Return to “Tim May <tcmay@got.net>”