Stallman's new enemy: the cloud
Mel Wilson
mwilson-4YeSL8/OYKRWk0Htik3J/w at public.gmane.org
Wed Oct 1 15:31:12 UTC 2008
D. Hugh Redelmeier wrote:
> OK, there's enough traffic that I'll bite.
>
> | From: Evan Leibovitch <evan-ieNeDk6JonTYtjvyW6yDsg at public.gmane.org>
>
>
> | I just don't get this one.
>
> He's right on at least the purely theoretical level.
>
> There are only a few things that you can do with a cloud and still be
> sure that you haven't leaked information to the provider.
:) There's a crypto technique by Rivest. I forget the official name,
but you could call it crypto by signing and flooding. For every
document you post, you post a flood of plausible but inaccurate
documents. The real document has a valid signature, the bogus
documents have bogus signatures.
It's awesomely expensive. Both in and of itself, and because for all
you know one of the bogus documents could get you arrested.
Mel.
--
The Toronto Linux Users Group. Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
More information about the Legacy
mailing list