Jim Bell's 10-part essay describing the architecture of a cryptographic assassination market -- a system in which it would be possible to anonamously order and be credited for assassinations. The architecture relies on public-key encryption, digital signatures, plausible deniability, pseudonymous remailers and the like.
Comments
Content
Jim Bell's 10-part essay describing the architecture of a cryptographic assassination market -- a system in which it would be possible to anonamously order and be credited for assassinations. The architecture relies on public-key encryption, digital signatures, plausible deniability, pseudonymous remailers and the like.