1996-04-27 - www.WhosWhere.com selling access to my employer’s passwd file

Header Data

From: rich@c2.org (Rich Graves)
To: cypherpunks@toad.com
Message Hash: ecd6033cd2bde4aeee47df5a8b7fb374338b1b0af21ffd06b46c2beb96e30be1
Message ID: <199604270912.CAA07530@Networking.Stanford.EDU>
Reply To: N/A
UTC Datetime: 1996-04-27 12:46:49 UTC
Raw Date: Sat, 27 Apr 1996 20:46:49 +0800

Raw message

From: rich@c2.org (Rich Graves)
Date: Sat, 27 Apr 1996 20:46:49 +0800
To: cypherpunks@toad.com
Subject: www.WhosWhere.com selling access to my employer's passwd file
Message-ID: <199604270912.CAA07530@Networking.Stanford.EDU>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

If you are involved with the affairs of a large organization, I urge you
to check www.whoswhere.com to see if they have a bunch of user email
addresses that they shouldn't.

Of course there is little that one can do about this kind of invasion of
privacy. But they don't have to be so fucking blatant and stupid about it.
They have the email addresses of DAEMONS from our password files in their
database.

There is no need for mailbombing, or anything like that. Our lawyers are
simply going to nuke them from orbit. Please check them out before they go
offline, so that you will have a shot at whatever is left.

- -rich

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMYHku43DXUbM57SdAQGQpwP/U9TzWE2vEjHYZo4eniVctFe3pVe0KIQe
FvdNOWTykqfgEyhagKuifmRwUgjjIcIZONzRDw1Hi7UrJbOghH3j9sW5wxsphbxU
3U0hHuKumAczUHn03IVkkF4JpobawEgHqqP1Y++PhNopAvqnVSu+hnf5aIS1R390
MlUiwpoo0OE=
=+Mm2
-----END PGP SIGNATURE-----





Thread