1998-09-07 - Re: What we are Fighting

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@cyberpass.net
Message Hash: ac206d821fbb91522c5194731d0fbd24db7133865275f7cde1b1ff95b8b7b42b
Message ID: <199809071546.LAA21825@camel7.mindspring.com>
Reply To: <v03130307b218f992deb9@[209.66.100.36]>
UTC Datetime: 1998-09-07 15:47:28 UTC
Raw Date: Mon, 7 Sep 1998 23:47:28 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Mon, 7 Sep 1998 23:47:28 +0800
To: cypherpunks@cyberpass.net
Subject: Re: What we are Fighting
In-Reply-To: <v03130307b218f992deb9@[209.66.100.36]>
Message-ID: <199809071546.LAA21825@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



It would be fitting for this list to be distinguished as
the place where crypto-in-a-crime was first committed.

What might that be? A match of the crime committed
to prevent widespread strong crypto?

Crypto-criminal anonymity in the national interest (governmental
secrecy) fighting to prevent crypto-criminal anonymity in the 
public interest (private secrecy).

This is not a troll, but query on what could be done to to tip the 
hand and identify those unnamed who are most fearful of strong 
cryptography, not their public rougers in the 3 divs of gov.







Thread