At 08:39 PM 8/28/2000 -0700, you wrote:
At 08:56 PM 8/28/00 -0500, you wrote:
At 01:27 PM 8/27/2000 -0700, you wrote:
At 12:06 PM 8/25/00 -0400, you wrote:
With only one repeater, wouldn't it be possible to "ping" the phone, and
determine the distance? From that, and if the tower can get a
Tim May wrote:
are you required to provide your private keys to an enemy (e.g. someone
who is sueing you) ?
The lawyers and lawyer larvae can comment better than I can. I
believe the answer is "yes, documents must be in usable form by your
ex-wife's lawyers," for example. This probably
--- begin forwarded text
Date: Mon, 28 Aug 2000 19:38:05 -0700
To: [EMAIL PROTECTED]
From: Somebody
Subject: Strange Bedfellows
How about this - Stewart Baker, ex-NSA General Counsel, and Doug Barnes,
ur-Cypherpunk, at the same company. http://www.mercury2.com/team.htm. I
don't think
Thank you for your message and for your interest in ZDNet e-centives.
We will reply to you as soon as we can.
This is an automated response.
Sincerely,
Your Friends at ZDNet e-centives
Dear cipherpunk1b1a,
Welcome to NYTimes.com!
We are delighted that you have decided to become a member of our community.
As a member you now have complete access to the Web's premier source for
news and information -- free of charge.
NYTimes.com not only provides you with in-depth coverage of
remove