Skip to main content

Myhrvold

Look, it’s not just nobodies like me who say this. Nathan Myrvold is XXX and a pretty smart (and pretty rich) guy. Here’s what he said about this a couple of decades ago when the first attempts at electronic cash were beginning [Levy, S. E-money in "Wired", December 1994)].

"There's a role for untraceable transactions. But it's not a panacea. Some people get very worked up about it. But there's been a very steady trend away from untraceable cash. There are cases where explicit traceability is a good thing. Like in my business expenses. I want them to trace it! All these things are there for a reason. They're not there as part of a plan by nefarious Big Brother. Look, I understand Chaum's concern to a certain degree. There's a lot of concern for privacy today. But I do worry about the idea of saving people from themselves. Just because I sign up for a traceable form of money doesn't mean I want my next-door neighbor to see my transactions."

Right. This is all about privacy.

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...