Cryptography Intellectual Property: Formalities of Cypherpunk

Steve Furlong demonfighter at gmail.com
Tue Jan 13 05:57:37 PST 2015


On Tue, Jan 13, 2015 at 8:39 AM, Robert Hettinga <hettinga at gmail.com> wrote:
>
> If it’s encrypted, and I have the key, it’s my property. That’s it.

Unless the NSA has backdoored the algorithm or Google/Apple/Amazon have
their own keys to your cloud storage or the TLAs have tapped the
unencrypted communications channels or ...

-- 
Neca eos omnes. Deus suos agnoscet. -- Arnaud-Amaury, 1209
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 627 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20150113/6dd2875b/attachment-0001.txt>


More information about the cypherpunks mailing list