Traceable Infrastructure is as vulnerable as traceable messages.

Jim Choate ravage at einstein.ssz.com
Fri Aug 3 14:05:32 PDT 2001



On Fri, 3 Aug 2001, Ray Dillinger wrote:

>    As long as the remailers themselves are traceable, make no mistake: 
> they exist only because the lions have not yet passed a law against them.
> 
>    You cannot have encryption technologies advancing and leaving the law 
> behind, so long as any vital part of the infrastructure you need is 
> traceable and pulpable by the law.

Exactly, which is why the 'small world' network model applied to key
management is such a powerful tool.


 --
    ____________________________________________________________________

                Nature and Nature's laws lay hid in night:
                God said, "Let Tesla be", and all was light.

                                          B.A. Behrend

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------






More information about the cypherpunks-legacy mailing list