CDR: Re: Codebreaking with a multi-Teraflops network: one technique

Bill Stewart bill.stewart at pobox.com
Tue Nov 7 16:21:50 PST 2000


At 04:01 PM 11/7/00 -0800, Ray Dillinger wrote:
>
>Let's say you're a high-level spook, and you've got a bunch of 
>encrypted intercepts of uncertain origin.  Gigabytes and gigabytes 
...
>It should be childs play to set up a "front", as a scientific or 
>charitable organization.  Dream up a CPU-intensive task that engages 
...
>Hire a bunch of people at the front organization who sincerely 
>believe that all these cycles are expended on the fake project, 
>and let them effusively thank all the people who download and run 
>the software.  Explain that you can't release the source, because 
>then people would modify it and your scientific data might be 
>corrupted.  


	Scamming
		Extra
			Teraflops for
				Intelligence 
??

:-)



				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





More information about the cypherpunks-legacy mailing list