Anonymous stock TRADING (was Saw this on CNN: )

Igor Chudov @ home ichudov at algebra.com
Mon Jun 3 23:22:36 PDT 1996


rick hoselton wrote:
> 
> You might also want to ask Ivan Boeskey(sp?).  I think he's out of 

Boesky.

Which brings up another ignorant question: suppose that I am a 
corporate officer who does receive substantial "insider" information,
for example results of audits, before they become public. What would
prevent such an insider from creating a phony offshore trading company,
and sending orders to that company using cypherpunks technology? 

If we suppose that the agent executing trades (which may even be a
computer, afaik) is trustworthy, the methods to deliver trade orders are
reliable, the computers are protected from van eyck monitoring, and the
officer is not spending too much money openly, what is there to prevent
or prove such violations of the law?

For example, the trading computer can have pseudonym address
xyz at alpha.c2.org, forwarded through a chain of remailers to
place_order at offshore.com.xx, and the officer sends pgp signed and
encrypted trade orders to that address, again through remailers.  What
besides traffic analysis is there to stop such violations?

Thanks,

	- Igor.






More information about the cypherpunks-legacy mailing list