CDR: Re: Codebreaking with a multi-Teraflops network: one technique
Bill Stewart
bill.stewart at pobox.com
Tue Nov 7 16:21:50 PST 2000
At 04:01 PM 11/7/00 -0800, Ray Dillinger wrote:
>
>Let's say you're a high-level spook, and you've got a bunch of
>encrypted intercepts of uncertain origin. Gigabytes and gigabytes
...
>It should be childs play to set up a "front", as a scientific or
>charitable organization. Dream up a CPU-intensive task that engages
...
>Hire a bunch of people at the front organization who sincerely
>believe that all these cycles are expended on the fake project,
>and let them effusively thank all the people who download and run
>the software. Explain that you can't release the source, because
>then people would modify it and your scientific data might be
>corrupted.
Scamming
Extra
Teraflops for
Intelligence
??
:-)
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
More information about the cypherpunks-legacy
mailing list