
Excerpts from mail.cypherpunks: 30-Jan-96 Re: No FV supporters? sameer@c2.org (711*)
Would someone like to implement such a thing? That would be "the cypherpunk way" of properly debunking FV's claims.
As I just explained, I don't think it would be nearly as effective as our attack. But for the record, I must remind everyone on this list of an important line that should not be crossed: Our program *demonstrated* key parts of a comprehensive attack on software-encrypted credit card numbers, but it most carefully did NOT implement those parts of that attack which would facilitate the actual theft and transport of those numbers. If anyone can similarly design and demonstrate a comprehensive attack on FV, that's their affair. However, if they don't follow our lead in acting responsibly, and instead choose to unleash their software as a live attack, First Virtual reserves the right to track them down to the best of its abilities and prosecute them to the full extent of the law. That's another important aspect of "process security" or multi-layer security. You take the legalities seriously. -- Nathaniel -------- Nathaniel Borenstein <nsb@fv.com> Chief Scientist, First Virtual Holdings FAQ & PGP key: nsb+faq@nsb.fv.com