rick hoselton wrote:
You might also want to ask Ivan Boeskey(sp?). I think he's out of
Boesky. Which brings up another ignorant question: suppose that I am a corporate officer who does receive substantial "insider" information, for example results of audits, before they become public. What would prevent such an insider from creating a phony offshore trading company, and sending orders to that company using cypherpunks technology? If we suppose that the agent executing trades (which may even be a computer, afaik) is trustworthy, the methods to deliver trade orders are reliable, the computers are protected from van eyck monitoring, and the officer is not spending too much money openly, what is there to prevent or prove such violations of the law? For example, the trading computer can have pseudonym address xyz@alpha.c2.org, forwarded through a chain of remailers to place_order@offshore.com.xx, and the officer sends pgp signed and encrypted trade orders to that address, again through remailers. What besides traffic analysis is there to stop such violations? Thanks, - Igor.