1995-10-03 - Telco Blob

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: f55cfc5d56f74392287d03d2969afd8f2b2916e4ef258ed2eb15a4fe065b1b5a
Message ID: <199510031308.JAA10163@pipe1.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-10-03 13:18:06 UTC
Raw Date: Tue, 3 Oct 95 06:18:06 PDT

Raw message

From: John Young <jya@pipeline.com>
Date: Tue, 3 Oct 95 06:18:06 PDT
To: cypherpunks@toad.com
Subject: Telco Blob
Message-ID: <199510031308.JAA10163@pipe1.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   Financial Times of October 3 has a humongous 40-page insert
   on international telecommunications -- markets, business,
   technology, and, to be sure, the tele-players lying,
   cheating, fearing the "computer hacking industry,"
   whimpering with delirious greed at the bountiful,
   multicultured consumer's mindless credulity of tekkie-
   gadgets. For the mil-beguiled Colin Powells there's even a
   colored global map of Big Blob telco strategic rapacity.

   A tiny cheering blip of machine-wash-n-readable T-stupidity
   on p. 34:

      Sutton dismisses worries out security -- despite a
      recent successful attempt to break the security on
      Internet financial transactions. An incident in August,
      when a researcher at the French National Institute of
      Computer Science and Control (INRIA) broke into the
      Internet security system, raised concerns about
      security.

      "A lot of security is about perception -- after all,
      every code can be broken. The INRIA incident only
      involved breaking a single code and needed massive
      computer resources to do it," says Mr Sutton.













Thread