At 08:32 PM 11/9/02 -0500, Tyler Durden wrote: >So I'm still playing with the idea of a publically-accessible document that >outlines the strategies, technologies, aims and requirements for somehow >uploading images and data to public repositorioes.
Such a document should enumerate the threat model and describe how each threat is resisted, or not. Specific use-cases can be written: the GI who took the picture; the photo-developer-tech who kept copies; the bored netop who intercepted the pix; an activist who is under <insert type> surveillance. >Anyone interested? And what does it mean (if anything) to do this within the >context of the Cypherpunk list? Dis be da place, at least for talk :-)
