Traceable Infrastructure is as vulnerable as traceable messages.
Jim Choate
ravage at einstein.ssz.com
Fri Aug 3 14:05:32 PDT 2001
On Fri, 3 Aug 2001, Ray Dillinger wrote:
> As long as the remailers themselves are traceable, make no mistake:
> they exist only because the lions have not yet passed a law against them.
>
> You cannot have encryption technologies advancing and leaving the law
> behind, so long as any vital part of the infrastructure you need is
> traceable and pulpable by the law.
Exactly, which is why the 'small world' network model applied to key
management is such a powerful tool.
--
____________________________________________________________________
Nature and Nature's laws lay hid in night:
God said, "Let Tesla be", and all was light.
B.A. Behrend
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage at ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
More information about the cypherpunks-legacy
mailing list