Stallman's new enemy: the cloud

Mel Wilson mwilson-4YeSL8/OYKRWk0Htik3J/w at public.gmane.org
Wed Oct 1 15:31:12 UTC 2008


D. Hugh Redelmeier wrote:
> OK, there's enough traffic that I'll bite.
> 
> | From: Evan Leibovitch <evan-ieNeDk6JonTYtjvyW6yDsg at public.gmane.org>
> 
> 
> | I just don't get this one.
> 
> He's right on at least the purely theoretical level.
> 
> There are only a few things that you can do with a cloud and still be
> sure that you haven't leaked information to the provider.

:)  There's a crypto technique by Rivest.  I forget the official name, 
but you could call it crypto by signing and flooding.  For every 
document you post, you post a flood of plausible but inaccurate 
documents.  The real document has a valid signature, the bogus 
documents have bogus signatures.

It's awesomely expensive.  Both in and of itself, and because for all 
you know one of the bogus documents could get you arrested.

	Mel.
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list