It seems as if Larry Lessig has figured out the fatal
flaw in anonymous or untraceable systems - that they
are not economically sustainable.
In the face of that argument, he does not propose that
they be banned, as Declan suspects:
> [Why do I get the feeling that Larry Lessig doesn't like "absol
In response to:
http://www.economist.co.uk/science/displayStory.cfm?story_id=2246018
To preserve freedom further, suggests Mr Lessig, anonymity could be
replaced by pseudonymity. It might become legal, for instance, to have
credit cards for online transactions under different names, as long as
thes
On Thu, 2003-12-04 at 20:15, Peter Gutmann wrote:
> How common is it to find an embedded system sophisticated enough to have a TCP
> stack and ethernet interface (and running SSL), but not sophisticated enough
> to have a malloc() implementation? I've always assumed that anything with the
> forme
The Third Annual Workshop on
Economics and Information Security
(WEIS04)
May 13-14, 2004
University of Minnesota
http://www.dtc.umn.edu/weis2004
Submissions due: March 1, 2004
"J Harper" <[EMAIL PROTECTED]> writes:
>>2) Make it functional on systems without memory allocation. Did I
>>mention that I work on (very) small embedded systems? Having fixed
>>spaces for variables is useful when you want something to run
>>deterministically for a long time with no resets, and
See the references by Pappu and Devadas
for lecture 18 of my class:
http://theory.lcs.mit.edu/classes/6.857/lecture.html
Cheers,
Ron
At 06:44 PM 12/4/2003, Peter Fairbrother wrote:
R. A. Hettinga wrote:
>
> --- begin forwarded text
>
>
> Status: U
> Date: Tue, 2 Sep 2003 14:45: