On Mon, 16 Jan 1995, Johnathan Corgan wrote:
It just occurred to me when reading this another method for ensuring the "I can't tell what's in it" condition with a data haven operator. Why not use a secret sharing system where the contraband data is split into a number of pieces and sent to different havens?
Damn it, you beat me to it. :-) [ ... ]
Ok, Eric, go ahead and blast your holes in this argument :)
I'm not Eric, but hey. This entire discussion is completely unnecessary. There are ways of removing operator liability without examining the submission at all. ---------- unix3.netaxs.com:/home/grendel 1/511> host bermuda-gw.alter.net bermuda-gw.alter.net has address 137.39.234.130 bermuda-gw.alter.net mail is handled by relay2.UU.NET bermuda-gw.alter.net mail is handled by relay1.UU.NET unix3.netaxs.com:/home/grendel 1/512> ---------- Nicht wahr? Michael