[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: extortion via digital cash
[email protected] writes:
> I was wondering, what if you demanded payment via Ecash,
> through nym servers, aliases, etc. From what I understand,
> it is just like cash, ie: no record of transaction, but you
> get the added bonus of not having to meet the other party-like
> a fund transfer.
This has been discussed quite a bit on the list before and there is even a
bit about it in Applied Cryptography. Basically the extortionist must be
careful in how he arranges payment. The extortionist must create blinded
proto-coins and send them to the extortionee to be signed. Otherwise the
extortionee can write down the serial numbers before sending the coins off and
the extortionist will get caught when trying to deposit.
Some of the cut-n-choose protocols for after-the-fact catching of double
spenders would prevent this from happening. Because the proto-coins from the
extortionist are blinded and the extortionee can't remove the blinding, it
would be impossible for the extortionee to properly complete the protocol with
the bank and pay-off the extortionist.
andrew