Network crypto is not enough: One example of why.
John Young
jya at pipeline.com
Fri Mar 2 13:58:34 PST 2001
Ray,
Please tell the make and model of the laptop, where it
was lifted and other details that would help a good
samaritan recognize it as what you say it is and has
in its innards.
No disinfo now. No risk insurance scamming, we've
been stung by that. Damn hi-value secret-rich laptops
are a menace to the underworld and time wasters for
undercovers overloaded with a leak-ploy of the spooks
copied by the thousands, when even pawnshops
have signs about laptops "who you kiddin."
The dame chopped and shopped your secrets if
they were that, copying spooks ploying a bonus
from likeminders with the same venal bosses eager
to steal when profits peter, copying the boss spooks
copying the leaders of the earth and heaven.
Yrs,
No. 38769
More information about the cypherpunks-legacy
mailing list