Your concept of data haven is good but has important limits. What if Philippine government shuts down your cable? Or if the good Sultan changes his mind, decides to nationalize your computers, read all the disks? What is needed is not ONE data haven but a NETWORK of data havens--more robust, just like Internet is more robust than single machine.
Signed,
The Admiral Isoroku Yamamoto who signs his messages thus:
–-BEGIN ORDO SIGNATURE BLOCK-– (lines and lines of gibberish)
–-END ORDO SIGNATURE BLOCK--
Randy closes that one without responding. Avi doesn't want them talking to Secret Admirers for fear that they will later be accused of stealing someone's ideas, so the reply to all of these e-mails is a form letter that Avi paid some intellectual property lawyer about ten thousand dollars to draft.
He reads another message simply because of the return address:
From: [email protected]
On a UNIX machine, "root" is the name of the most godlike of all users, the one who can read, erase, or edit any file, who can run any program, who can sign up new users and terminate existing ones. So receiving a message from someone who has the account name "root" is like getting a letter from someone who has the title "President" or "General" on his letterhead. Randy's been root on a few different systems, some of which were worth tens of millions of dollars, and professional courtesy demands he at least read this message.
I read about your project.
Why are you doing it?
followed by an Ordo signature block.
One has to assume this is an attempt to launch some sort of philosophical debate. Arguing with anonymous strangers on the Internet is a sucker's game because they almost always turn out to be--or to be indistinguishable from--self-righteous sixteen-year-olds possessing infinite amounts of free time. And yet the "root" address either means that this person is in charge of a large computer installation, or (much more likely) has a Finux box on his desk at home. Even a home Finux user has got to be several cuts above your average Internet-surfing dilettante. Randy opens up a terminal window and types
whois eruditorum.org
and a second later gets back a block of text from the InterNIC:
eruditorum.org (Societas Eruditorum)
followed by a mailing address: a P.O. Box in Leipzig, Germany.
After that a few contact numbers are listed. All of them have the Seattle area code. But the three-digit exchanges, after the area code, look familiar to Randy, and he recognizes them as gateways into a forwarding service, popular among the highly mobile, that will bounce your voice mail, faxes, etc. to wherever you happen to be at the moment. Avi, for example, uses it all the time.
Scrolling down, Randy finds:
Record last updated on 18-Nov-98.
Record created on 1-Mar-90.
The "90" jumps out. That's a prehistoric date by Internet standards. It means that Societas Eruditorum was way ahead of the game. Especially for a group based in Leipzig, which was part of East Germany until about then.
Domain servers in listed order:
NS.SF.LAUNDRY.ORG
followed by the dotted quad for laundry.org, which is a packet anonymizer used by many Secret Admirers to render their communications untraceable.
It all adds up to nothing, yet Randy can't get away with assuming that this message came from a bored sixteen-year-old. He should probably make some token response. But he's afraid that it'll turn out to be a come-on for some kind of business proposition: probably some mangy high-tech company that's looking for capital.
In the latest version of the business plan, there is probably some explanation of why Epiphyte(2) is building the Crypt. Randy can simply cut and paste it into an e-mail reply to [email protected]. It'll be something vaporous and shareholder-pleasing, and therefore kind of alienating. With any luck it will discourage this person from pestering him anymore. Randy double-clicks on Ordo's eyeball/pyramid icon, and it opens up a little text window on the screen, where he is invited to type commands. Ordo's also got a lovely graphical user interface, but Randy scorns it. No menus or buttons for him. He types
>decrypt epiphyteBizPlan.5.4.ordo
The computer responds
verify your identity: enter the pass phrase or 'bio' to opt for biometric verification.
Before Ordo will decrypt the file, it needs to have the private key: all 4096 bits of it. The key is stored on Randy's hard disk. But bad guys can break into hotel rooms and read the contents of hard disks, so the key itself has been encrypted. In order to decrypt it, Ordo needs the key to the key, which (in Cantrell's one concession to user-friendliness) is a pass phrase: a string of words, easier to remember than 4096 binary digits. But it has to be a long phrase or else it's too easy to break.
The last time Randy changed his pass phrase, he was reading another World War II memoir. He types: