Michael Nielsen wrote:
> On Mon, 2 Nov 1998, Spike Jones wrote:
> > > Spike Jones wrote: it would be a herculean
> > > > task, even for the sunnyvale commercial space division alone,
> > > > not to mention a mind-numbing waste of time. i convinced
> > > > myself the resources would never be allocated. spike
> > >
> > > Eliezer S. Yudkowsky wrote: Keywords. Sentence structures.
> > > Statistical correlation. You'd be surprised
> > > at what technology can do.
> > >
> > > In your case, the phrase "offer" and "price" might have been the trigger.
> In this connection the emacs command M-X spook is rather amusing. Here's
> a sample result of a single application:
> "Qaddafi SDI security KGB AK-47 Croatian Ortega Legion of Doom FSF
> cryptographic Uzi Waco, Texas Saddam Hussein terrorist radar"
Even more fun would be the wide-spread use of a public-key
crypto program whose cipher-text output was then encoded through
a program that substituted terrorist keywords.
> With sufficiently widespread use of variants of this type of program,
> monitoring email becomes much more difficult.
> Michael Nielsen