1994-04-29 - Re: spooks on cypherpunks

Header Data

From: rustman@netcom.com (Rusty H. Hodge)
To: cypherpunks@toad.com
Message Hash: f8f219a6e0322e085ea3063c281b5b784b25d8bfdcbdf58c9c88a94cb0424e29
Message ID: <199404290134.SAA05922@netcom.com>
Reply To: N/A
UTC Datetime: 1994-04-29 01:33:33 UTC
Raw Date: Thu, 28 Apr 94 18:33:33 PDT

Raw message

From: rustman@netcom.com (Rusty H. Hodge)
Date: Thu, 28 Apr 94 18:33:33 PDT
To: cypherpunks@toad.com
Subject: Re: spooks on cypherpunks
Message-ID: <199404290134.SAA05922@netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>   From: nobody@jarthur.cs.hmc.edu
>   Date: Thu Apr 28 00:36:57 PDT 1994
>
>   NetSurfer <jdwilson@gold.chem.hawaii.edu>
>   Robert Mathews <mathews@gold.chem.hawaii.edu>
>
>   be aware

You know, spooks need strong Crypto, too.  I think you're making the
assumption that the only reason a spook is here is to infiltrate us and do
us harm.  I bet it is quite the opposite.

What is the best way to stay hidden and secure?  Use strong crypto that can
be found almost anywhere (like PGP). Strong crypto that doesn't scream
goverment or worse.  Blend in with the rest fo the crypto traffic.

Spooks get *caught* by doing things that are out of the ordinary.  Spooks
stay in business by not standing out and disappearing in the crowds.

It probably sounds silly, but there are probably more or at least as many
spooks who *like* what we're doing than those who oppose it.

Rusty Hodge, Cyberbeticist, Resident Futurist. <rustman@netcom.com>







Thread