1995-12-17 - taking electronic privacy into our own hands

Header Data

From: Eric Anderson <ericande@cnw.com>
To: “‘cypherpunks@toad.com>
Message Hash: a6218ea2cc430b5b480bff7765936d0ca098aa4cee545686466e974fdd96211c
Message ID: <01BACBCB.01742B20@king1-21.cnw.com>
Reply To: N/A
UTC Datetime: 1995-12-17 00:25:08 UTC
Raw Date: Sun, 17 Dec 1995 08:25:08 +0800

Raw message

From: Eric Anderson <ericande@cnw.com>
Date: Sun, 17 Dec 1995 08:25:08 +0800
To: "'cypherpunks@toad.com>
Subject: taking electronic privacy into our own hands
Message-ID: <01BACBCB.01742B20@king1-21.cnw.com>
MIME-Version: 1.0
Content-Type: text/plain


	Would it be possible to write a program ( i.e. a worm or Trojan)  to ferret out personal information that is stored in databases and encrypt it?
I was just wondering what such an undertaking would entail.

Eric






Thread