1995-12-22 - Re: taking electronic privacy into our own hands

Header Data

From: anonymous-remailer@shell.portal.com
To: cypherpunks@toad.com
Message Hash: e92e74f6d5003083a6a80acab15cebcd0506839edff5743a80810b0ee28f02d5
Message ID: <199512222026.MAA21559@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1995-12-22 21:06:34 UTC
Raw Date: Sat, 23 Dec 1995 05:06:34 +0800

Raw message

From: anonymous-remailer@shell.portal.com
Date: Sat, 23 Dec 1995 05:06:34 +0800
To: cypherpunks@toad.com
Subject: Re: taking electronic privacy into our own hands
Message-ID: <199512222026.MAA21559@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 15 Dec 1995, Eric Anderson wrote:

> 	Would it be possible to write a program ( i.e. a worm or
> Trojan) to ferret out personal information that is stored in databases
> and encrypt it?
>
> I was just wondering what such an undertaking would entail.

Actually, there is no need to write any such code.

AT&T distributes just such a beast to any and all comers.  It can take
personal information and send it out over a secure socket layer.

I think a couple of partners in crime, Cheswick and Bellovin of AT&T
research had a hand in its continuing distribution.

> Eric


Alice de 'nonymous ...               <an455120@anon.penet.fi>


                                  ...just another one of those...


P.S.  This post is in the public domain.
                  C.  S.  U.  M.  O.  C.  L.  U.  N.  E.






Thread