At 2:58 PM -0500 3/10/00, Adam Back wrote:
>
>User chosen limits per time period (eg. per year) could be placed on the
>number and volume of payee anonymous payments to protect themseles against
>extortion or theft if the user wishes, or no limit could be placed if the
>user prefers.

As with strategies for mutually assured destruction, this approach 
only works to the extent other agents really and truly believe this 
is an ironclad limit. Most kidnappers or extortionists will simply 
not _believe_ that artificial limits on cash transfers prevent their 
target from finding a way to transfer cash (though they will probably 
believe that a poor person cannot raise the cash, which is why poor 
people are seldom the targets of either kidnappings or extortion, or 
blackmail, for that matter).

You see, targets of extortion, kidnapping, and blackmail REALLY WANT 
TO PAY. If they didn't _want_ to pay, they simply wouldn't.

Sure, they'd rather they not be faced with the situation in the first 
place, but once the predicate has been established, they WANT to pay. 
This is why many countries, including the U.S., attempt to block 
targets of such actions from paying. Game theory and all.

The extortionist when faced with the Back Defense simply says: "Then 
open another account."

This is so obvious, but the talk of "defenses" misses this point.

(There are game-theoretic defenses, possibly. If one is believed by 
others to be a militant non-negotiator, prepared to see one's child 
executed or whatever the extortionist/kidnapper is threatening if his 
demands are not met, then perhaps this is a deterrent. As I said, a 
lot like MAD. Dr. Strangelove and the RAND folks would understand 
these points implicitly.)


>
>Stefan suggested one more way that an extortionist can obtain payee
>anonymity: he can demand that the payer physically mails him his smart card
>loaded with the chosen value.
>
>Stefan has been discussing the distinction between "purely digital extortion"
>and "extortion involving some physical risk, or trust of other parties",
>because the latter are generic attacks and unavoidable.

There are many obvious ways to arrange extortion which entails no 
physical risk whatsoever with a nominally "payee traceable" system.

Here's just one:

Ed the extortionist demands payment from Vic the victim. In a 
nominally payee traceable system, Vic pays Ed his extortion demand 
and then goes to the bank (or some similar variant) and colludes with 
them to reveal the account of Ed. Ed the extortionist is also Ed the 
payee, so payee traceability means Ed is identified.

However, instead of doing this, Ed tells Vic to have his bank or 
merchant (an officially approved Merchant, no less) sell an item of 
value equal to the extortion demand to someone he says will be 
approaching the merchant. For example, a million dollars worth of 
data. Call the buyer Alice, for Alice the accomplice. Alice pays one 
dollar and receives the million dollars' worth of product.

(Yes, this all assumes digital products...if _physical_ goods are 
being shipped, then even payer untraceability is largely lost. 
Luckily for this scenario, the emphasis we have placed has always 
been on cyberspatial goods...information, data, access to other 
information, etc. Including even digital money, in some versions, 
which is the money changer scenario, basically.)

Since Alice the accomplice has payer untraceability, natch, her 
purchase cannot be traced.

The fiction of her making a  token dollar payment is not needed, of 
course. The scenario works equally well if Vic the victim is simply 
instructed to buy a million dollars's worth of some digital property 
and then send it untraceably to an account specified by Ed. Perhaps 
via remailers, perhaps via BlackNet. Etc. Likewise, Alice the 
accomplice need not be a separate person (duh) from Ed the 
extortionist. All of this "syntactic sugar" drops away. I suppose it 
can be argued that this is no longer a case of "digital cash" in any 
reasonable sense, as Ed the extortionist is simply demanding payment 
in some digital property form. But it shows how other channels solve 
many of the problems of not having full two-way untraceability. Put 
more abstractly, payer untraceability combined with conventional 
money laundering techniques results in an untraceable "reverse" 
channel.

[This is a terribly important point. So long as prices are not set by 
third parties, these "back channels" are effectively payee 
untraceability. I called this "conventional money laundering" because 
it's the familiar method of over- or under-paying for goods. Or of 
buying an art work for pennies on the dollar. Consult the usual 
papers on methods of money launderers and extend to cyberspace.]

I'm presenting this scenario, one of many, to dispense with the 
notion that "payee traceable" digital cash does much to stop 
extortion, kidnapping, contract killing markets, blackmail, etc.

I haven't tried to convert these arguments into stuff about blinded 
coins, returned values, exponentiations, etc. At the level of 
"chunking" I'm dealing with here, it seems to be enough to accept the 
notion of "payer untraceable" and "payee untraceable" and such and 
then reason from these chunked levels. "Assume a payer-untraceable 
mechanism exists."

(Detailed interpretation into Chaum- or Brands-levels of detail is 
certainly important, even critical, for some types of discussions. 
Especially if anyone, including me, is making unfounded claims about 
specific properties of Brands-type mechanisms. But one does not have 
to describe automobiles at the level of firing sequences in cylinders 
and cam motions in order to reason about traffic problems.  I spent a 
while some years back drawing pictures and diagrams and reading 
Chaum's papers, enough to give me the gist of his system. Endless 
diagrams drawn by Ian Goldberg and Doug Barnes and others at 
Cypherpunks meetings conveyed some more info. I confess to not having 
learned the Brands stuff in any detail. I'm staying at the chunking 
level I outlined. It will be up to others to analyze his protocols in 
gory detail and find ways to subvert them to our ends.)

I claim that a payer untraceable system produces results largely 
indistinguishable from a true two-way untraceable system. With some 
work, of an amount to be determined by the surrounding infrastructure.


--Tim May

-- 
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
"Cyphernomicon"             | black markets, collapse of governments.

Reply via email to