Assassination Politics -- Jim Bell

Published on July 2016 | Categories: Documents | Downloads: 40 | Comments: 0 | Views: 427
of x
Download PDF   Embed   Report

Jim Bell's 10-part essay describing the architecture of a cryptographic assassination market -- a system in which it would be possible to anonamously order and be credited for assassinations. The architecture relies on public-key encryption, digital signatures, plausible deniability, pseudonymous remailers and the like.

Comments

Content

Jim Bell's 10-part essay describing the architecture of a cryptographic assassination market -- a system in which it would be possible to anonamously order and be credited for assassinations. The architecture relies on public-key encryption, digital signatures, plausible deniability, pseudonymous remailers and the like.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close