On Thu, 26 Dec 2002, Anonymous wrote:
> One leverage point for possibly encouraging this to happen is in P2P,
> methinks. A few power-users have been prosecuted recently, so imagine
> a nice little crypto-tunnel (and mp3 disc-encryptor) app that could
> easily be injected into the Kazaa or other G
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 9:57 PM -0500 on 12/26/02, Somebody wrote:
> Obviously he hasn't read Njal's Saga.
Yeah, people say this a lot, but it's more the exception that proves
the rule.
For instance, multi-generational blood feud that runs over the course
of Njal's Sag
Blah blah blah wrote...
(Begin quote)
"The down side is the concern that they will be doing something unusual. Since there
is no mass use of PGP, crypto users do stand out - all 23,000 of us regular users
worldwide are well mapped, charted and identified. I don't have a good answer for
this. Wh