--
extremist consumer activists are hurting their cause by
conjuring up farfetched scenarios that expose them as kooks.
(That last point certainly applies to those here who continue to
predict that the government will take away general purpose
computing capabilities, allow only
--
The camel's nose is already in the tent.
With the Dmitri Sklyarov case, and the DeCSS case, we already have
bit crimes, where possession of certain software capabilities is
an illegal act.
Of course, each software capability that is criminalized requires
other software capabilities to
----
http://news.com.com/2100-1023-944640.html?tag=politech
RIAA talks tough on Web radio copying By Declan McCullagh
July 17, 2002, 4:50 PM PT
WASHINGTON--The Recording Industry Association of America
said Wednesday that it has begun pressing for anti-copying
----
http://news.com.com/2100-1023-944640.html?tag=politech
RIAA talks tough on Web radio copying By Declan McCullagh
July 17, 2002, 4:50 PM PT
WASHINGTON--The Recording Industry Association of America
said Wednesday that it has begun pressing for anti-copying
--
On 11 Jul 2002 at 1:22, Lucky Green wrote:
Trusted roots have long been bought and sold on the secondary
market as any other commodity. For surprisingly low amounts, you
too can own a trusted root that comes pre-installed in 95% of
all web browsers deployed.
How much, typically?
And
--
On 6 Jul 2002 at 9:33, R. A. Hettinga wrote:
Thawte has now announced a round of major price increases. New
cert prices appear to have almost doubled, and renewals have
increased more than 50%. While Thawte proclaims this is their
first price increase in five years, this comes at a
--
On 8 Jul 2002 at 11:25, Trei, Peter wrote:
Some forms of creation require little in the way of up-front
investment. Others do. Consider movies. While some of the people
involved get to do creative work that they love, many don't, and
they all have to make a living somehow. Would the
--
On 8 Jul 2002 at 7:43, Anonymous wrote:
The death of democracy is at hand.
http://www.zmag.org/meastwatch/hertz.htm
If only it were true.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
ZWTx0h+Wns4sOe0bvQDCC5yxL/l1ayPHLSFxALlf
--
Obviously, the end of copyright may well mean a substantial
reduction in the proceeds from big movies, but it will hardly mean
a total end to those proceeds (the powerpuff girl movie is one big
toy advertisment)
How big an effect will a reduction in money mean?
If you go back thirty
--
On 9 Jul 2002 at 1:01, Anonymous wrote:
If DRM hardware and software are widely available, they reason,
it will be that much easier to get legislation passed to make
them mandatory. []
This argument makes superficial sense, but it ultimately
contradicts itself on one major
--
On 8 Jul 2002 at 7:43, Anonymous wrote:
The death of democracy is at hand.
http://www.zmag.org/meastwatch/hertz.htm
If only it were true.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
ZWTx0h+Wns4sOe0bvQDCC5yxL/l1ayPHLSFxALlf
--
On 8 Jul 2002 at 11:25, Trei, Peter wrote:
Some forms of creation require little in the way of up-front
investment. Others do. Consider movies. While some of the people
involved get to do creative work that they love, many don't, and
they all have to make a living somehow. Would the
--
On 7 Jul 2002 at 0:42, Gary Jeffers wrote:
I suspect the the US solution would be hardware. All new
hardware would be maliced and old hardware would become
obsolete.
The plan, as envisaged by our enemies, is that first almost
everyone will voluntarily run a trusted operating
--
On 5 Jul 2002 at 3:10, Nomen Nescio wrote:
Suppose you know someone who has been working for years on a
novel. But he lacks confidence in his work and he's never shown
it to anyone. Finally you persuade him to let you look at a copy
of his manuscript, but he makes you promise not to
--
On 5 Jul 2002 at 14:45, AARG! Anonymous wrote:
Right, and you can boot untrusted OS's as well. Recently there
was discussion here of HP making a trusted form of Linux that
would work with the TCPA hardware. So you will have options in
both the closed source and open source worlds to
--
James A. Donald:
Again, If you offered the average guy the deal Would you like
on demand access to all movies and television shows ever made,
even if it meant fewer and lower budget movie releases in
future?, I think most people would go for on demand access to
everything.
--
On 4 Jul 2002 at 7:38, Anonymous wrote:
Okay, you are afraid that only properly authorized code will
run. Let's talk about one area: programming languages.
What about compilers? Development systems? No doubt you'll
claim these will be restricted. They'll be like assault
weapons.
--
On 4 Jul 2002 at 7:38, Anonymous wrote:
Okay, you are afraid that only properly authorized code will
run. Let's talk about one area: programming languages.
What about compilers? Development systems? No doubt you'll
claim these will be restricted. They'll be like assault
weapons.
--
On 4 Jul 2002 at 1:26, Sampo Syreeni wrote:
But try constructing an Independence Day without Will Smith. Or
the special effects. Or the soundtrack. Or the distribution
chain. Try guaranteeing that it arrives on schedule without
making a loss. I think you will not be able to accomplish
--
On 3 Jul 2002 at 2:36, Anonymous wrote:
However doing a straight devaluation was politically
unacceptable at the time. Because the dollar was pegged to
gold, devaluing the dollar meant in effect increasing the value
of gold in terms of dollars. This would represent a tremendous
--
On 3 Jul 2002 at 10:48, xganon wrote:
Do you really think that DRM systems could eliminate cypherpunk
applications? Have you thought this through in detail? Please
expand on it.
The system as specified is harmless, because it can run anyone's
code, and thus can run napster like
--
We both created stuff we didn't expect to be paid for - these
emails.
On 3 Jul 2002 at 20:49, Sampo Syreeni wrote:
True. But somehow I fail to see how one can scale this sort of
reasoning to entail anything approaching one of the current
TOP10 movies.
First, lost of people make
--
On 4 Jul 2002 at 1:26, Sampo Syreeni wrote:
But try constructing an Independence Day without Will Smith. Or
the special effects. Or the soundtrack. Or the distribution
chain. Try guaranteeing that it arrives on schedule without
making a loss. I think you will not be able to accomplish
--
On 3 Jul 2002 at 2:36, Anonymous wrote:
However doing a straight devaluation was politically
unacceptable at the time. Because the dollar was pegged to
gold, devaluing the dollar meant in effect increasing the value
of gold in terms of dollars. This would represent a tremendous
--
Tim May:
I have half a dozen computers, all usable in various ways. Not
even in a Chinese-type police state could these
legally-acquired computers, acquired for a lot of money, be
declared outlawed.
Major Variola (ret)
First you register them. Then declare them a public
--
On 1 Jul 2002 at 22:10, Anonymous wrote:
The fact is that the market can't solve this kind of problem.
That's right, markets are not perfect. [] But information
objects, absent successful DRM restrictions, are effectively
public goods. Markets do not handle public goods well. It
--
On 1 Jul 2002 at 15:06, Tim May wrote:
I have strong views on all this DRM and TCPA stuff, and
especially on the claim that some form of DRM is needed to
prevent government from taking over control of the arts.
But we said everything that needed to be said _years_ ago. No
point in
--
On 1 Jul 2002 at 15:06, Tim May wrote:
I have strong views on all this DRM and TCPA stuff, and
especially on the claim that some form of DRM is needed to
prevent government from taking over control of the arts.
But we said everything that needed to be said _years_ ago. No
point in
--
On 1 Jul 2002 at 22:10, Anonymous wrote:
The fact is that the market can't solve this kind of problem.
That's right, markets are not perfect. [] But information
objects, absent successful DRM restrictions, are effectively
public goods. Markets do not handle public goods well. It
On 27 May 2002 at 19:56, Peter Gutmann wrote:
[EMAIL PROTECTED] writes:
My impression is that S/MIME sucks big ones, because it commits one
to a certificate system based on verisign or equivalent.
I'll say this one more time, slowly for those at the back: What you're
criticising is PEM
--
noticed that a good majority of the P2P efforts introduced at
CODECON all included support for encryption as part of the
protocol. The various
On 26 May 2002 at 19:24, Morlock Elloi wrote:
I predict that first attempt to apply this on the
gnutella/morpheus/kazaa/napster scale
On 27 May 2002 at 19:56, Peter Gutmann wrote:
[EMAIL PROTECTED] writes:
My impression is that S/MIME sucks big ones, because it commits one
to a certificate system based on verisign or equivalent.
I'll say this one more time, slowly for those at the back: What you're
criticising is PEM
--
Having been the verisign guy at a couple of companies, it appears
to me that the administrative costs of both models are
unacceptably high.
The hierarchical verisign model is useful when one wishes to
verify that something comes from a famous and well known name --
that this software
--
On 23 May 2002 at 0:24, Lucky Green wrote:
Tell me about it. PGP, GPG, and all its variants need to die
before S/MIME will be able to break into the Open Source
community, thus removing the last, but persistent, block to an
instant increase in number of potential users of secure email
--
On 23 May 2002 at 21:58, Adam Back wrote:
This won't achieve the desired effect because it will just
destroy the S/MIME trust mechanism. S/MIME is based on the
assumption that all CAs are trustworthy. Anyone can forge any
identity for clients with that key installed. S/MIME isn't
--
On 23 May 2002 at 10:57, Meyer Wolfsheim wrote:
3. The people who might use it if it is easy.
This is Joe Sixpack. This is who you are worrying about, wanting
S/MIME to deliver on its promises. This is Templeton is worrying
about, wanting opportunistic mail encryption.
Joe sixpack
--
On 23 May 2002 at 0:24, Lucky Green wrote:
Tell me about it. PGP, GPG, and all its variants need to die
before S/MIME will be able to break into the Open Source
community, thus removing the last, but persistent, block to an
instant increase in number of potential users of secure email
--
On 23 May 2002 at 10:57, Meyer Wolfsheim wrote:
3. The people who might use it if it is easy.
This is Joe Sixpack. This is who you are worrying about, wanting
S/MIME to deliver on its promises. This is Templeton is worrying
about, wanting opportunistic mail encryption.
Joe sixpack
--
On 23 May 2002 at 21:58, Adam Back wrote:
This won't achieve the desired effect because it will just
destroy the S/MIME trust mechanism. S/MIME is based on the
assumption that all CAs are trustworthy. Anyone can forge any
identity for clients with that key installed. S/MIME isn't
--
On 21 May 2002 at 15:03, Meyer Wolfsheim wrote:
NAI is now taking steps to remove the remaining copies of PGP
from the Internet, not long after announcing that the company
will not release its fully completed Mac OS X and Windows XP
versions?
Not a problem -- we have too many
--
On 21 May 2002 at 15:03, Meyer Wolfsheim wrote:
NAI is now taking steps to remove the remaining copies of PGP
from the Internet, not long after announcing that the company
will not release its fully completed Mac OS X and Windows XP
versions?
Not a problem -- we have too many
--
On 14 May 2002 at 21:00, Adam Back wrote:
I've also moved more than 2,000 GBP that between bank accounts
and investment accounts in the past -- withdraw from current
account 10,000 GBP, walk across the street and pay into another
institutions investment account and the money is
--
Richard Fiero:
As the article excerpted below states, in 2001 there was
about $620 billion dollars in US currency out there
somewhere and 65% was in $100 dollar bills.
James A. Donald:
Presumably most of those $100 bills are changing hands in
suitcases and brown paper
--
Richard Fiero:
As the article excerpted below states, in 2001 there was
about $620 billion dollars in US currency out there
somewhere and 65% was in $100 dollar bills.
James A. Donald:
Presumably most of those $100 bills are changing hands in
suitcases and brown paper
--
On 13 May 2002 at 22:34, Richard Fiero wrote:
As the article excerpted below states, in 2001 there was about
$620 billion dollars in US currency out there somewhere and 65%
was in $100 dollar bills.
Presumably most of those $100 bills are changing hands in
suitcases and brown paper
--
James A. Donald:
Seems to me that most of our economy is arguably illegal.
R. A. Hettinga
Fine. Document that, pease. Show me statistics.
Obviously that is a claim that cannot be directly documented,
since most people decline to register their business with the
department of census
--
On 13 May 2002 at 22:34, Richard Fiero wrote:
As the article excerpted below states, in 2001 there was about
$620 billion dollars in US currency out there somewhere and 65%
was in $100 dollar bills.
Presumably most of those $100 bills are changing hands in
suitcases and brown paper
--
James A. Donald:
Seems to me that most of our economy is arguably illegal.
R. A. Hettinga
Fine. Document that, pease. Show me statistics.
Obviously that is a claim that cannot be directly documented,
since most people decline to register their business with the
department of census
--
On 13 May 2002 at 13:20, Morlock Elloi wrote:
Classic cypherpunk pipe dream is a dot-com syndrome - very low
cost software/devices - billions will use it - we'll (get rich
laid | save the world).
The only other feature of untraceable money which may get larger
market attention -
--
On 13 May 2002 at 18:27, R. A. Hettinga wrote:
And, thus, nobody will ever use the stuff. The market for
criminal behavior is trivial. Puny. Nonexistent, and getting
smaller all the time, no matter what political crises we face,
or, paradoxically, how much our nation-states write more
--
People don't actually have to understand it as long as they
get paid, of course. People who are getting paid want to get
paid as cheaply as possible, ceterus parabus, and so any
payment mechanism's
On 12 May 2002 at 1:31, Morlock Elloi wrote:
At which point do you fail to
--
James A. Donald:
Another interesting application is controlled traceability --
Andy wants to be able to prove he paid Betty, but he does not
want third parties to be able to prove he paid Betty.
Morlock Elloi wrote:
Mental constructs like this one, complicated schemes that
--
On 11 May 2002 at 18:55, Morlock Elloi wrote:
Also let's not forget that person A givin person B cash is
zero-cost untraceable transaction.
Sometimes, for example internet pornography, it is hard for Andy
to give Betty cash.
Another interesting application is controlled traceability --
--
On 11 May 2002 at 9:30, anonimo arancio wrote:
This is so fucking boring. No one gets laid any more for doing
FC.
Who cares for Yet Another Implementation of Something That No
One Will Ever Use ?
We have credit cards. Nothing will ever replace them, in spite
of 2% transaction fees.
--
On 11 May 2002 at 18:55, Morlock Elloi wrote:
Also let's not forget that person A givin person B cash is
zero-cost untraceable transaction.
Sometimes, for example internet pornography, it is hard for Andy
to give Betty cash.
Another interesting application is controlled traceability --
--
On 11 May 2002 at 9:30, anonimo arancio wrote:
This is so fucking boring. No one gets laid any more for doing
FC.
Who cares for Yet Another Implementation of Something That No
One Will Ever Use ?
We have credit cards. Nothing will ever replace them, in spite
of 2% transaction fees.
On 28 Apr 2002 at 16:20, Morlock Elloi wrote:
How exactly does the introduction of IPV6 on a machine that is
NAT-ted by the ISP who doesn't give shit about IPV6 help the
situation ?
James A. Donald:
To connect to the IPV6 world from inside a NAT network, you need a
machine that is both
--
On 29 Apr 2002 at 14:58, Sampo Syreeni wrote:
[IPv6] nicely solves the problem with NATs, true. However, most
firewalls I know are there for security reasons. Those will
likely be adapted to work for 6to4 as well. The transition
period will likely see some cracks where p2p can work,
--
On 28 Apr 2002 at 22:26, Jan Dobrucki wrote:
and third, Americans say, respect human rights, when the US
hasn't signed any conventions protecting human rights, because
if it did, it would have to stop sending people to death row.
Yet oddly, the people drawing up these conventions were
--
On 28 Apr 2002 at 16:20, Morlock Elloi wrote:
How exactly does the introduction of IPV6 on a machine that is
NAT-ted by the ISP who doesn't give shit about IPV6 help the
situation ?
To connect to the IPV6 world from inside a NAT network, you need a
machine that is both inside and
On 28 Apr 2002 at 16:20, Morlock Elloi wrote:
How exactly does the introduction of IPV6 on a machine that is
NAT-ted by the ISP who doesn't give shit about IPV6 help the
situation ?
James A. Donald:
To connect to the IPV6 world from inside a NAT network, you need a
machine that is both
--
On 28 Apr 2002 at 16:20, Morlock Elloi wrote:
How exactly does the introduction of IPV6 on a machine that is
NAT-ted by the ISP who doesn't give shit about IPV6 help the
situation ?
To connect to the IPV6 world from inside a NAT network, you need a
machine that is both inside and
--
On 25 Apr 2002 at 18:26, Ken Brown wrote:
This kind of thing has implications for economics technology
markets of course (cf Santa Fe, ad infinitum). People who think
like ecologists tend to assume that a more complex market, with
more participants, and more kinds of interaction
--
On 18 Feb 2002 at 14:37, Sampo Syreeni wrote:
we still need one of the machines to be outside a firewall. I
think what anonymous is describing is the situation when each
and every non-corporate customer is behind a firewall owned by
an ISP, corporations shield their employees behind
--
At 12:15 PM -0700 on 4/27/02, [EMAIL PROTECTED] wrote:
People who think like economists or libertarians will conclude
that markets tend to stability, because humans will analyze
fluctuations, attempt to predict them, and then take
precautionary action to protect themselves, which
--
Joseph Ashwood
Because with a pRNG we can sometimes prove very important
things, while with a RNG we can prove very little (we can't
even prove that entropy actually exists, let alone that we
can collect it).
James A. Donald:
Don't be silly. Of course we know that
--
Jim Choate wrote:
If you can't develop a RNG in software (ie you'd be in a
state of sin), what makes you think you can do it using
-only- digital gates in hardware? You can't.
James A. Donald:
Classic Choatian physics.
Of course you can.
Jim Choate:
Not if you use -only-
--
Joseph Ashwood
Because with a pRNG we can sometimes prove very important
things, while with a RNG we can prove very little (we can't
even prove that entropy actually exists, let alone that we
can collect it).
James A. Donald:
Don't be silly. Of course we know that
--
Tim May:
As a meta-point, the world is not in short supply of lots of
good RNGs, ranging from Johnson noise detectors to very strong
Blum-Blum-Shub generators. The interesting stuff in crypto
lies in other places.
Eugen Leitl
I disagree here somewhat. Cryptography ttbomk
--
On 7 Apr 2002 at 13:31, F. Marc de Piolenc wrote:
I'm sorry you've bought the terrorist line that it's all about
US support for Israel. I know better. We could withdraw from the
Middle East tomorrow, and all that would change would be the
excuse.
Possibly, but what does it benefit
--
On 1 Apr 2002 at 8:49, Curt Smith wrote:
And James, although the best standard may win, a lack of viable
alternatives is unhealthy.
We have an oversupply, not an undersupply, of viable alternatives.
The reason for all the collisions and incompatibilities is feature
creep, and the
--
multimedia and the like). Clearly, ISPs want to keep their
customers happy, as they know that they will otherwise switch
to another provider.
On 1 Apr 2002 at 15:43, Morlock Elloi wrote:
Nonsense. Following this logic, broadcast/cable TV should be of
high quality since they also
--
On 31 Mar 2002 at 10:03, Tim May wrote:
And so now PGP (or GPG) use is utterly balkanized, utterly
useless.
[...]
Is there a solution? I would think that a keep it simple,
stupid strategy is needed: Forget the hooks into popular
mailers (Eudora, Outlook, Entourage), forget the OS X
Tim May:
My contention is that physical gold sitting in a warehouse
in, say, the Bank of Bermuda, is no different from a stack
of $20 bills sitting in that same bank.
James A. Donald:
The difference comes when the physical stuff has to move in
and out of the bank in Bermuda.
--
On 31 Mar 2002 at 10:03, Tim May wrote:
And so now PGP (or GPG) use is utterly balkanized, utterly
useless.
[...]
Is there a solution? I would think that a keep it simple,
stupid strategy is needed: Forget the hooks into popular
mailers (Eudora, Outlook, Entourage), forget the OS X
Tim May:
This episode, and the likely fizzling of the silly E-Gold
scheme, is a useful object lesson.
Someone:
e-gold is working fine, though there seem to be a huge number
of ponzi schemes seeking e-gold.
The fundamental pseudonymization mechanism of e-gold is that
you can
--
On 23 Mar 2002 at 9:26, Anonymous wrote:
Not all of these are still going but it shows that there is a
lot more in the P2P file sharing and publishing world than just
a few moldering old cypherpunk projects from the 90s. P2P has
really passed the cypherpunk world by.
As far as
--
On 19 Mar 2002 at 9:21, Sunder wrote:
So why do you [Jim Choate] run a CDR node? If you're claiming
that the ideals that Erich Hughes and Tim May forged are CACL
theories and you disagree with them, then why run a such a
mailing list node?
Back in the big period of revolutions, the
--
On Tue, Feb 26, 2002 at 02:04:16AM -, Frog3 wrote:
The cost [To factor RSA 1024] is the need to build a
machine that can do 53 billion simultaneous, independent
ECM factorizations for smoothness testing It's not clear
how amenable this would be to hardware implementation
A
--
On 23 Feb 2002, at 12:33, Declan McCullagh wrote:
This is the last mattd post I'll see for a while, I expect,
since I've updated my kill.rc file. But the prospect of a
cypherpunks subscriber threatening to send 2 MB attachments
to the list is not a pleasant one.
I like my enemies
--
On 21 Feb 2002, at 1:03, F. Marc de Piolenc wrote:
She could be referring to the Japanese takeover of French
Indochina. The Axis powers met fierce, though poorly
organized, resistance in their invasion of France. It was
no cakewalk.
It was a cakewalk. The french bent over, asked
--
On 13 Feb 2002, at 12:16, Aimee Farr wrote:
Jim Bell was arrested for stalking protected persons. Not
even our military is exposed to the sort of personalized
fear and exposure that public servants and their families
experience today.'
Perhaps that is because the military do not
--
On 7 Feb 2002, at 1:42, [EMAIL PROTECTED] wrote:
Jim, I believe Peter's point, and mine as well, is that
posters such as Jei and mattd differ by their intent. Jei
is obviously a participant, and an active one. Whether or
not anyone cares to listen, he's legit in that he is
actively
--
On 3 Feb 2002, Dr. Evil wrote:
Microsoft does support encrypted disks. They do in
Windows XP and I think they may have had it earlier too.
Who doesn't support encrypted disk? The open source
guys. There is only _one_ open source OS that currently
supports encrypted disk in a
--
James A. Donald:
it is regrettable that disk encryption is not part of
the operating system -- but if Microsoft put it in
before we had a strong, widely adopted system, they
would doubtless muck it up.
Dr Evil
Microsoft does support encrypted disks.
So they do:
--
Jei, quoting an old but still too true document
An additional grave concern is key management. Contrary
to some beliefs,key management is not a solved problem.
All of the proposals contain some mechanism for key
management, but none of them have been demonstrated to be
scalable
--
On 29 Jan 2002, at 19:01, Jei wrote:
Enron May Spark Revolt of
Professionals
By James K. Galbraith
James K. Galbraith, a professor at the University of Texas
at Austin, is the author, most recently, of Inequality and
Industrial Change: A
--
A lot of doom and gloom posts have appeared about how
cypherpunks failed of their dreams.
We expected to overthrow governments world wide by tuesday,
and we did not. But despite this the cypherpunk agenda is
still progressing well.
We do have universal strong communications encryption,
--
On 20 Jan 2002, at 1:53, Aimee Farr wrote:
Somebody wrote:
I, in particular (and many other Cpunk Movement members)
do not consider People That Control Armed Men to be us
and will not identify
their snitching
capabilities with my well-being.
So Cypherpunks is a political
--
On 20 Jan 2002, at 13:14, [EMAIL PROTECTED] wrote:
Effective revolutionaries need intelligence, organization
and discipline to conduct effective propaganda, plan
sucessful insurrections, and sieze and hold power.
Anarcho capitalists do not plan to seize and hold power.
Intelligence,
--
On 10 Jan 2002, at 23:46, david wrote:
Any jurisdiction that will prosecute and
convict someone because the body of a person attempting
burglary happens to be on the outside instead of the inside
will certainly prosecute and get a conviction for tampering
with the evidence.
--
On 11 Jan 2002, at 11:45, Eric Cordian wrote:
Not quite. 11 Israeli athletes were captured by some
Palestinians. They were killed when the Israeli military
attacked the site where they were being held, and
slaughtered everything that moved.
It is and always has been the
--
On 11 Jan 2002, at 19:26, Eric Cordian wrote:
This is not simply a case of reporting something, and then
tossing the burden of proof on the opposition to prove it
wasn't said. This is a case of something pretty widely
disseminated on the Net, to which not a single official
voice of
--
On Monday, January 7, 2002, at 04:11 PM, Tim May wrote:
I think it is a moral necessity to kill anyone trying to
steal anything (beyond the utterly trivial or confusable,
e.g., one should not kill someone picking up a toy left
out in the yard...might be a mistake, he might be
--
On 31 Dec 2001, at 0:49, mattd wrote:
CommieRot! (english) by James 8:00pm Mon Sep 3 '01
Anarchists killed more people in Spain than pinochet in
Chile.See...http://www.jim.com/world.html Post cut. Yeah,
but... (english) by Superguy 10:50pm Mon Sep 3 '01
...anarchists only killed
of dispute between Stalin and Trotsky was that
Trotsky though Stalin was too soft on the kulaks.
mattd:
Spain,jamesd,I thought we were talking about SPAIN! I know
a bit about Trotsky's russian background,the betrayal of
Makhno and Krondstadt,Its a huge separate issue
The Trots I encountered
--
mattd:
Gaston Leval,Bookchin,Paz,Chomsky and even H.Thomas.
James A. Donald:
Commie liars, except for Thomas, who does not say what
you claim he does.
mattd:
Ahwell! Still if you want to lump stalinists,trots and
anarchs together
The difference between Stalinists and Trots is
On 24 Dec 2001, at 9:40, Nomen Nescio wrote:
How simple can an ecash mint be?
For the simplest case there should be no accounts. All the mint does is
exchange coins for other coins. There are no customer lists, no records
of transactions (except as needed for double-spending detection).
--
James A. Donald:
One could of course have a pile of gold, and physically
and in person exchange coins for physical gold
On 25 Dec 2001, at 9:44, Tim May wrote:
1. Must money be tied to intrinsic stores of value? I think
the answer is clearly No. The U.S. dollar is not in any
direct
--
On 23 Dec 2001, at 21:39, Black Unicorn wrote:
While this might not directly impact the person running or
developing the system it certain serves to discourage users
of the system after a single allegation has been made.
Customer flight would be awfully dramatic I suspect.
You are as
1 - 100 of 246 matches
Mail list logo