<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:13px"><div id="yui_3_16_0_1_1442825109502_4959" dir="ltr"><span id="yui_3_16_0_1_1442825109502_4958">Your paper:    <a href="https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0CCsQFjACahUKEwiF_b_E7IfIAhWQmIgKHc_tAuY&url=http%3A%2F%2Fwww.arijuels.com%2Fwp-content%2Fuploads%2F2013%2F09%2Fpublic_gyges.pdf&usg=AFQjCNHOBvCYwJ5Aq0CmHTOY53sGdRs5Sw&sig2=L_lh-zCi016f7Y3jbKVKlQ&bvm=bv.103073922,d.cGU" id="yui_3_16_0_1_1442825109502_8900">https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0CCsQFjACahUKEwiF_b_E7IfIAhWQmIgKHc_tAuY&url=http%3A%2F%2Fwww.arijuels.com%2Fwp-content%2Fuploads%2F2013%2F09%2Fpublic_gyges.pdf&usg=AFQjCNHOBvCYwJ5Aq0CmHTOY53sGdRs5Sw&sig2=L_lh-zCi016f7Y3jbKVKlQ&bvm=bv.103073922,d.cGU</a></span></div><div id="yui_3_16_0_1_1442825109502_4959" dir="ltr"><span><br></span></div><div id="yui_3_16_0_1_1442825109502_4959" dir="ltr"><span id="yui_3_16_0_1_1442825109502_8941">Thank you for your reply, Dr. Juels, </span></div><div id="yui_3_16_0_1_1442825109502_5059"><span><br></span></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><span id="yui_3_16_0_1_1442825109502_5057">Once you read my essay, I think you will understand my concern about the motivation for your research, and its potential consequences.   Superficially, and certainly to someone unfamiliar with my idea (Assassination Politics essay),  I'm sure it sounds useful and indeed beneficial to try to prevent the construction and operation of "criminal contracts".   One problem that I see, as a lifetime libertarian, is that "criminal" may mean no more than "what the government wants to ban" rather than an actual victim crime.  Worse, governments are powerfully motivated to prevent developments that will someday likely destroy them.</span></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><span id="yui_3_16_0_1_1442825109502_5503" class="">I suggest that you study the analyses of Bob Vroman  <a href="http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=009ape" id="yui_3_16_0_1_1442825109502_5754">http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=009ape</a>    ,    <a href="http://www.mail-archive.com/cypherpunks-moderated@minder.net/msg02068.html" id="yui_3_16_0_1_1442825109502_6269">http://www.mail-archive.com/cypherpunks-moderated@minder.net/msg02068.html</a>     and  of Bob Murphy,  </span><span style="font-size: small; font-family: arial, sans-serif; line-height: 20.2222px;" id="yui_3_16_0_1_1442825109502_5851" class="">www.anti-state.</span><wbr style="font-size: small; font-family: arial, sans-serif; line-height: 20.2222px;" id="yui_3_16_0_1_1442825109502_5853" class=""><span style="font-size: small; font-family: arial, sans-serif; line-height: 20.2222px;" id="yui_3_16_0_1_1442825109502_5855" class="">com/murphy/</span><span style="font-size: small; font-weight: bold; font-family: arial, sans-serif; line-height: 20.2222px;" id="yui_3_16_0_1_1442825109502_5857" class="">murphy17</span><span style="font-size: small; font-family: arial, sans-serif; line-height: 20.2222px;" id="yui_3_16_0_1_1442825109502_5859" class="">.</span><span style="font-size: small; font-weight: bold; font-family: arial, sans-serif; line-height: 20.2222px;" id="yui_3_16_0_1_1442825109502_5861" class="">html</span>   (although the Murphy essay might not be available, except as an archive.)  as well as by R.  Sukumaran   <a href="http://www.idsa.in/strategicanalysis/CryptologyDigitalAssassinationandtheTerrorismFuturesMarket_rsukumaran_0404.html" id="yui_3_16_0_1_1442825109502_5597" style="background-color: rgb(255, 255, 255);" class="">http://www.idsa.in/strategicanalysis/CryptologyDigitalAssassinationandtheTerrorismFuturesMarket_rsukumaran_0404.html</a>. </div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr">Further, consider<br></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"> <a href="https://github.com/isislovecruft/patternsinthevoid/blob/master/content/anarchism/game-theory-anarchism-ii-how-information-can-smash-the-state.md" id="yui_3_16_0_1_1442825109502_6139">https://github.com/isislovecruft/patternsinthevoid/blob/master/content/anarchism/game-theory-anarchism-ii-how-information-can-smash-the-state.md</a></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><a href="https://c4ss.org/content/1157" id="yui_3_16_0_1_1442825109502_6418">https://c4ss.org/content/1157</a><br></div><div id="yui_3_16_0_1_1442825109502_5058"><br></div><div id="yui_3_16_0_1_1442825109502_5058" dir="ltr"><a href="http://archive.is/zYH0e" id="yui_3_16_0_1_1442825109502_6562" style="background-color: rgb(255, 255, 255);">series -- anti-state.com</a><br></div><div id="yui_3_16_0_1_1442825109502_5058"><br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr"><a href="https://www.reddit.com/r/Anarcho_Capitalism/comments/2jo578/arguments_for_against_insurrectionist_ancapism/" id="yui_3_16_0_1_1442825109502_6678">https://www.reddit.com/r/Anarcho_Capitalism/comments/2jo578/arguments_for_against_insurrectionist_ancapism/</a><br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr">There is a lot more where this comes from.<br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr">Keep in mind that when I wrote the AP essay, technologies such as Tor, Bitcoin, and especially Ethereum and Augur simply did not exist. But today they do, or at least they soon will.  And that, I consider to be an extremely good thing.</div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr">So perhaps you will understand that I consider that trying to prevent _all_ "criminal contracts" from being formed is a major, and indeed dangerous mistake.  While I do not believe that such an effort can ever succeed, I think it would be best not to try.</div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr"><br></div><div id="yui_3_16_0_1_1442825109502_6595" dir="ltr">          Jim Bell</div><div id="yui_3_16_0_1_1442825109502_6680"><br></div><div id="yui_3_16_0_1_1442825109502_6738"><br></div>  <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 13px;" id="yui_3_16_0_1_1442825109502_4963"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;" id="yui_3_16_0_1_1442825109502_4962"> <div dir="ltr" id="yui_3_16_0_1_1442825109502_4961"> <hr size="1" id="yui_3_16_0_1_1442825109502_5198">  <font size="2" face="Arial" id="yui_3_16_0_1_1442825109502_4964"> <b id="yui_3_16_0_1_1442825109502_6555"><span style="font-weight:bold;" id="yui_3_16_0_1_1442825109502_6554">From:</span></b> Ari Juels <juels@cornell.edu><br> <b><span style="font-weight: bold;">To:</span></b> jim bell <jdb10987@yahoo.com> <br><b><span style="font-weight: bold;">Cc:</span></b> "runting@gmail.com" <runting@gmail.com>; "akosba@cs.umd.edu" <akosba@cs.umd.edu> <br> <b><span style="font-weight: bold;">Sent:</span></b> Wednesday, September 16, 2015 2:32 PM<br> <b id="yui_3_16_0_1_1442825109502_5055"><span style="font-weight: bold;" id="yui_3_16_0_1_1442825109502_5054">Subject:</span></b> Re: Your paper on criminal contracts<br> </font> </div> <div class="y_msg_container" id="yui_3_16_0_1_1442825109502_4965"><br><div id="yiv5844945283"><div id="yui_3_16_0_1_1442825109502_4968">
<div id="yui_3_16_0_1_1442825109502_4967">
<div id="yui_3_16_0_1_1442825109502_4966">Dear Mr. Bell,</div>
<div id="yui_3_16_0_1_1442825109502_4969"><br clear="none">
</div>
<div id="yui_3_16_0_1_1442825109502_4970">Thank you for your original note and follow-up. We’re indeed planning to read your essay and cite it as appropriate in our next paper revision (slated to come out in January).</div>
<div id="yui_3_16_0_1_1442825109502_4972">
<div id="yui_3_16_0_1_1442825109502_4971"><font class="yiv5844945283Apple-style-span" color="#000000"><font class="yiv5844945283Apple-style-span" face="Calibri"><br clear="none">
</font></font></div>
<div id="yui_3_16_0_1_1442825109502_4973"><font class="yiv5844945283Apple-style-span" color="#000000"><font class="yiv5844945283Apple-style-span" face="Calibri">Yours,</font></font></div>
<div id="yui_3_16_0_1_1442825109502_4974"><font class="yiv5844945283Apple-style-span" color="#000000"><font class="yiv5844945283Apple-style-span" face="Calibri"><br clear="none">
</font></font></div>
<div id="yui_3_16_0_1_1442825109502_4975"><font class="yiv5844945283Apple-style-span" color="#000000"><font class="yiv5844945283Apple-style-span" face="Calibri">AJ</font></font></div>
<div id="yui_3_16_0_1_1442825109502_4976"><br clear="none">
</div>
</div>
</div>
<div id="yui_3_16_0_1_1442825109502_4977"><br clear="none">
</div>
<span id="yiv5844945283OLK_SRC_BODY_SECTION">
</span><div class="qtdSeparateBR"><br><br></div><div class="yiv5844945283yqt8434586631" id="yiv5844945283yqt23677"><div style="font-family:Calibri;font-size:11pt;text-align:left;color:black;BORDER-BOTTOM:medium none;BORDER-LEFT:medium none;PADDING-BOTTOM:0in;PADDING-LEFT:0in;PADDING-RIGHT:0in;BORDER-TOP:#b5c4df 1pt solid;BORDER-RIGHT:medium none;PADDING-TOP:3pt;" id="yui_3_16_0_1_1442825109502_4979"></div><div id="yui_3_16_0_1_1442825109502_4984"><div id="yui_3_16_0_1_1442825109502_4983"><div style="color:#000;background-color:#fff;font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:13px;" id="yui_3_16_0_1_1442825109502_4982"><div id="yiv5844945283yui_3_16_0_1_1442033498384_3518" style="font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:13px;"><div id="yiv5844945283yui_3_16_0_1_1442033498384_3517" style="font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px;"><div class="yiv5844945283y_msg_container" id="yiv5844945283yui_3_16_0_1_1442033498384_3516"><div id="yiv5844945283"><div id="yiv5844945283yui_3_16_0_1_1442033498384_3515"><div id="yiv5844945283yui_3_16_0_1_1442033498384_3514" style="color:#000;background-color:#fff;font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px;"><div class="yiv5844945283yqt0142132509" id="yiv5844945283yqt48324"><div id="yiv5844945283yui_3_16_0_1_1440878565794_3903" style="font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px;"><div id="yiv5844945283yui_3_16_0_1_1440878565794_3902" style="font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px;"><div dir="ltr" id="yiv5844945283yui_3_16_0_1_1440878565794_3901">
<font id="yiv5844945283yui_3_16_0_1_1440878565794_3908" size="2" face="Arial"><b id="yiv5844945283yui_3_16_0_1_1440878565794_3912"><span id="yiv5844945283yui_3_16_0_1_1440878565794_3911" style="font-weight:bold;">From:</span></b> jim bell <<a rel="nofollow" shape="rect" ymailto="mailto:jdb10987@yahoo.com" target="_blank" href="mailto:jdb10987@yahoo.com">jdb10987@yahoo.com</a>><br clear="none">
<b id="yiv5844945283yui_3_16_0_1_1442033498384_3520"><span id="yiv5844945283yui_3_16_0_1_1442033498384_3519" style="font-weight:bold;">To:</span></b> "<a rel="nofollow" shape="rect" ymailto="mailto:juels@cornell.edu" target="_blank" href="mailto:juels@cornell.edu">juels@cornell.edu</a>" <<a rel="nofollow" shape="rect" ymailto="mailto:juels@cornell.edu" target="_blank" href="mailto:juels@cornell.edu" id="yui_3_16_0_1_1442825109502_4991">juels@cornell.edu</a>>; "<a rel="nofollow" shape="rect" ymailto="mailto:runting@gmail.com" target="_blank" href="mailto:runting@gmail.com">runting@gmail.com</a>"
 <<a rel="nofollow" shape="rect" ymailto="mailto:runting@gmail.com" target="_blank" href="mailto:runting@gmail.com">runting@gmail.com</a>>; "<a rel="nofollow" shape="rect" ymailto="mailto:akosba@cs.umd.edu" target="_blank" href="mailto:akosba@cs.umd.edu">akosba@cs.umd.edu</a>" <<a rel="nofollow" shape="rect" ymailto="mailto:akosba@cs.umd.edu" target="_blank" href="mailto:akosba@cs.umd.edu">akosba@cs.umd.edu</a>>; Cpunks List <<a rel="nofollow" shape="rect" ymailto="mailto:cypherpunks@cpunks.org" target="_blank" href="mailto:cypherpunks@cpunks.org">cypherpunks@cpunks.org</a>>
<br clear="none">
<b id="yiv5844945283yui_3_16_0_1_1442033498384_3522"><span id="yiv5844945283yui_3_16_0_1_1442033498384_3521" style="font-weight:bold;">Sent:</span></b> Tuesday, August 25, 2015 10:14 AM<br clear="none">
<b id="yiv5844945283yui_3_16_0_1_1440878565794_3914"><span id="yiv5844945283yui_3_16_0_1_1440878565794_3913" style="font-weight:bold;">Subject:</span></b> Your paper on criminal contracts<br clear="none">
</font></div>
<div class="yiv5844945283y_msg_container" id="yiv5844945283yui_3_16_0_1_1440878565794_3904">
<br clear="none">
<div id="yiv5844945283">
<div id="yiv5844945283yui_3_16_0_1_1440878565794_3906">
<div id="yiv5844945283yui_3_16_0_1_1440878565794_3905" style="color:#000;background-color:#fff;font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px;">
Dear Professors Juels (<a rel="nofollow" shape="rect" target="_blank" href="http://www.arijuels.com/" id="yui_3_16_0_1_1442825109502_5046">http://www.arijuels.com/</a>) and Shi (<a rel="nofollow" shape="rect" ymailto="mailto:runting@gmail.com" target="_blank" href="mailto:runting@gmail.com">runting@gmail.com</a>), and Ahmed Kosba  <a rel="nofollow" shape="rect" ymailto="mailto:akosba@cs.umd.edu" target="_blank" href="mailto:akosba@cs.umd.edu">akosba@cs.umd.edu</a> :    I've found a reference
 to your recent paper, <a rel="nofollow" shape="rect" target="_blank" href="http://www.initc3.org/publications.html" id="yui_3_16_0_1_1442825109502_5047">http://www.initc3.org/publications.html</a>.  "The Ring of Gyges: Using Smart Contracts for Crime."   Perhaps you are not aware, but 20 years ago (1995-6) I wrote an essay on a very similar
 subject.  I called it "Assassination Politics".  cryptome.org/ap.htm .                 Jim Bell</div>
</div>
</div>
<br clear="none">
<br clear="none">
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<br clear="none">
<br clear="none">
</div>
</div>
</div>
</div>
</div>
</div></div>

</div></div><br><br></div> </div> </div>  </div></body></html>