[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: ecash remailer

>Hal writes:
>[suggesting a problem with Ed the Currency Cleaner]
>> What about this, though: Alice did not mean to pay Bob, but rather
>> Charlie, and Bob stole the coins.  He launders them through Ed's
>> service.  Charlie never got the cash, and Alice complains to the bank
>> that the coins were stolen.  The bank says, fine, we can identify the
>> perpetrator, let's see... it's Ed.  Ed is now charged with theft and
>> has an expensive and uncertain legal experience ahead of him.
>Jumping in hastily:
>It seems to me that Ed faces a larger problem if the above scenario turns
>out to be a viable attack. Consider the following sequence: Alice and
>Charlie decide to get some (payee-anonymous) currency laundromat in hot 
>water. Alice (payer-anonymously) washes some coins at the laundromat.
>Con-man Charlie claims he didn't get paid for some fictional transaction with
>Alice. Alice complains to the bank, and the rest proceeds as before. The
>Alice-frames-Ed situation is functionally equivalent to the Bob-robs-Charlie
>situation from the bank's perspective.

Wouldn't the ability to have the bank prove that the coins were 'cashed'
make this all null and void? The only way this would work would be if
Charlie is willing to completely forego cashing in the coins, *ever*. Should
he cash them in later, Ed would seem to have grounds for suspicion/complain.

Dave Merriman
This is a test (3 UUE lines) of the unconstitutional ITAR - 1/713th
of the PGP executable. See below for getting YOUR chunk! 
------------------ PGP.ZIP Part [015/713] -------------------
M=$<(&L`#*IPP",(G6(,,S,`P](<2RWU96XCW86/JBYV8A\[email protected]'HB_9H#&\X
M8H,),S$8G>&.WP(8IRA`-M['+`Q%&_C"">5-F%[email protected]<_Q$;*P'',Q$Z/AA[8M
for next chunk to export --> http://dcs.ex.ac.uk/~aba/export/
My web page: http://www.geopages.com/CapitolHill/1148