At 08:32 PM 11/9/02 -0500, Tyler Durden wrote:
>So I'm still playing with the idea of a publically-accessible document
that
>outlines the strategies, technologies, aims and requirements for
somehow
>uploading images and data to public repositorioes.

Such a document should enumerate the threat model and describe how each
threat
is resisted, or not.

Specific use-cases can be written: the GI who took the picture; the
photo-developer-tech who
kept copies; the bored netop who intercepted the pix; an activist who is
under <insert type>
surveillance.

>Anyone interested? And what does it mean (if anything) to do this
within the
>context of the Cypherpunk list?

Dis be da place, at least for talk :-)

Reply via email to