17 Dec
2003
17 Dec
'03
11:17 p.m.
I am presently looking into leasing fiber plant to set up a secure net with some of the attributes Nick Szabo mentions. Without enhancements to his scheme, however, I do not see how my cuso tomers can be sure that I am not recording traffic routine g, even if I claim that I am not. Furthermore, what is to prevent third parties from taping my ping my trunks and decoding the signalling which is used to direct the route switching? ------------------------------------------------------------------------ Stuart W. Card, Consultant, Card & Associates -- Research & Development Box 153 RR 1 Newport Rd Utica NY 13502 315-735-1717 / FAX -8469 swc@uc1.ucsu.edu or cards@top.cis.syr.edu "Who is John Galt?"