</div>https://c4ss.org/conten= t/1157">https://c4ss.org/content/1157</a>
</div>
</div>=http://archive.is/zYH0e" style=3D"backgroun= d-color:rgb(255, 255, 255);">series -- anti-state.com</a>
</div>https://www.reddit.com/r/An= archo_Capitalism/comments/2jo578/arguments_for_against_insurrectionist_anca=mail.com>; "akosba@cs.umd.edu"
; Cpunks List Sent: Tuesday, August 25, 2015 10:14 AM Subject: Your paper on criminal contracts Dear Professors Juels (http://www.arijuels.com/) and Shi (runting@gmail.com= ), and Ahmed Kosba =C2=A0akosba@cs.umd.edu :=C2=A0 =C2=A0 I've found a refe= rence to your recent paper, http://www.initc3.org/publications.html.=C2=A0 = "The Ring of Gyges: Using Smart Contracts for Crime."=C2=A0=C2=A0 Perhaps y= ou are not aware, but 20 years ago (1995-6) I wrote an essay on a very simi= lar subject. =C2=A0I called it "Assassination Politics". =C2=A0cryptome.org= /ap.htm . =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Jim Bell =20 ------=_Part_1164330_120160450.1442874412718 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable <html><body> For some reason, my first attempt to upload this didn't s= eem to 'take'.</span></div><span> Jim Bell</span></div>
<br><br></div>----- Forwarded Message -----
<b>From:</span></b> jim bell <jdb10987@yahoo= .com>
<b>To:</span>= </b> Ari Juels <juels@cornell.edu>
<b>Cc:</span></b> "runting@gmail.com" <runting@gmail= .com>; "akosba@cs.umd.edu" <akosba@cs.umd.edu>; Cpunks List <cy= pherpunks@cpunks.org>
<b>Sent:</span></b> Monday, September 21, 2015 2:50 AM
<b>Subject:</span></b> Re: Your paper = on criminal contracts
</font> </div>Your paper: &= nbsp; https://www.google.com/ur= l?sa=3Dt&rct=3Dj&q=3D&esrc=3Ds&source=3Dweb&cd=3D3&= cad=3Drja&uact=3D8&ved=3D0CCsQFjACahUKEwiF_b_E7IfIAhWQmIgKHc_tAuY&a= mp;url=3Dhttp%3A%2F%2Fwww.arijuels.com%2Fwp-content%2Fuploads%2F2013%2F09%2= Fpublic_gyges.pdf&usg=3DAFQjCNHOBvCYwJ5Aq0CmHTOY53sGdRs5Sw&sig2=3DL= _lh-zCi016f7Y3jbKVKlQ&bvm=3Dbv.103073922,d.cGU">https://www.google.com/= url?sa=3Dt&rct=3Dj&q=3D&esrc=3Ds&source=3Dweb&cd=3D3&am= p;cad=3Drja&uact=3D8&ved=3D0CCsQFjACahUKEwiF_b_E7IfIAhWQmIgKHc_tAuY= &url=3Dhttp%3A%2F%2Fwww.arijuels.com%2Fwp-content%2Fuploads%2F2013%2F09= %2Fpublic_gyges.pdf&usg=3DAFQjCNHOBvCYwJ5Aq0CmHTOY53sGdRs5Sw&sig2= =3DL_lh-zCi016f7Y3jbKVKlQ&bvm=3Dbv.103073922,d.cGU</a></span></div><span>
</span></div>Thank you for your reply, Dr. Juels, </span></div><span>
</span><= /div><= span id=3D"yiv5182106525yui_3_16_0_1_1442825109502_5057">Once you read my e= ssay, I think you will understand my concern about the motivation for your = research, and its potential consequences. Superficially, and certain= ly to someone unfamiliar with my idea (Assassination Politics essay),  = ;I'm sure it sounds useful and indeed beneficial to try to prevent the cons= truction and operation of "criminal contracts". One problem that I s= ee, as a lifetime libertarian, is that "criminal" may mean no more than "wh= at the government wants to ban" rather than an actual victim crime. W= orse, governments are powerfully motivated to prevent developments that wil= l someday likely destroy them.</span></div>
</div>I suggest th= at you study the analyses of Bob Vroman http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=3D009= ape">http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=3D009ape<= /a> , http= ://www.mail-archive.com/cypherpunks-moderated@minder.net/msg02068.html</a> = and of Bob Murphy, </span>www.anti-sta= te.</span>com/murphy/</span>murphy17= </span>.</span>html</span> &nb= sp;(although the Murphy essay might not be available, except as an archive.= ) as well as by R. Sukumaran http://www.idsa.in/strategicanalysi= s/CryptologyDigitalAssassinationandtheTerrorismFuturesMarket_rsukumaran_040= 4.html" style=3D"background-color:rgb(255, 255, 255);">http://www.idsa.in/s= trategicanalysis/CryptologyDigitalAssassinationandtheTerrorismFuturesMarket= _rsukumaran_0404.html</a>. </div>
</div>Further, consider
</div>
</div>https://github.com/isislovecruft/patternsinthevoid/blob/master/content/ana= rchism/game-theory-anarchism-ii-how-information-can-smash-the-state.md">htt= ps://github.com/isislovecruft/patternsinthevoid/blob/master/content/anarchi= sm/game-theory-anarchism-ii-how-information-can-smash-the-state.md</a>https://www.reddit.com/r/Anarcho_Capitalism/comments/2jo578/argument= s_for_against_insurrectionist_ancapism/</a>
</div>
</div>
</div>There is a lot more where this comes from.
</div>
</div>Keep in mind that when I wrote the AP essay, = technologies such as Tor, Bitcoin, and especially Ethereum and Augur simply= did not exist. But today they do, or at least they soon will. And th= at, I consider to be an extremely good thing.</div>
</div>So perhaps = you will understand that I consider that trying to prevent _all_ "criminal = contracts" from being formed is a major, and indeed dangerous mistake. &nbs= p;While I do not believe that such an effort can ever succeed, I think it w= ould be best not to try.</div>
</div>&nbs= p; Jim Bell</div><= br clear=3D"none"></div>
</div>=
</div>
From:</span></b> Ari Juels <juels= @cornell.edu>
<b>To= :</span></b> jim bell <jdb10987@yahoo.com>
<b>Cc:</span></b> "runting@gmail.com" <runtin= g@gmail.com>; "akosba@cs.umd.edu" <akosba@cs.umd.edu>
<b>Sent:</span></b> Wednesday, Se= ptember 16, 2015 2:32 PM
Subject:</span></b> Re: Your paper on cr= iminal contracts
</font> </div></div>
Dear Mr. Bell,
</div>
Thank you for your= original note and follow-up. We=E2=80=99re indeed planning to read your es= say and cite it as appropriate in our next paper revision (slated to come o= ut in January).</div>
</font></font></div>Yours,</font></font></div>
</font></font></div>AJ</font></font></div>
</div> </div> </div>
</b> "juels@cornell.edu= a>" <
</div> </span>
</div></div>From:</span></b> jim bell <jdb10987@yahoo.com</a>>
To:juels@cornell.edu</a>>; "runting@gmail.com</a>" <runting@gmail.com</a>= >; "akosba@cs.umd.edu= a>" <akosba@cs.umd.edu<= /a>>; Cpunks List <cypherpunks@cpunks.org</a>>
Sent:</b> Tuesday, August 25, 2015 10:14 AM
Subject:<= /span></b> Your paper on criminal contracts
</font></div>
Dear Professors Juels (http://www.ari= juels.com/">http://www.arijuels.com/</a>) and Shi (runting@gmail.com</a>), and Ahmed Kosba akosba@cs.umd.edu</a> : = I've found a reference to your recent paper, http://www.ini= tc3.org/publications.html">http://www.initc3.org/publications.html</a>.&nbs= p; "The Ring of Gyges: Using Smart Contracts for Crime." Perhap= s you are not aware, but 20 years ago (1995-6) I wrote an essay on a very s= imilar subject. I called it "Assassination Politics". cryptome.org/ap= .htm . Jim Bell </div> </div>
</div> </div> </div> </div> </div> </div> </div>
</div> </div> </div> </div> </div> </div></div> </div></div>
</div> </div></div></div><= /div></div></div></div></div>
</div> <= /div> </div></div> </div></div></div></div></body></html> ------=_Part_1164330_120160450.1442874412718-- Download2283Age (days ago)2283Last active (days ago)
0 comments1 participantsparticipants (1)
jim bell