1997-05-11 - Money orders, debit cards, …

Header Data

From: daw@cs.berkeley.edu (David Wagner)
To: cypherpunks@cyberpass.net
Message Hash: efd46009c4c77f58068fe3dc78f5e2f140d02170356510b9f55310bbeeff21b7
Message ID: <5l42hm$u44@joseph.cs.berkeley.edu>
Reply To: N/A
UTC Datetime: 1997-05-11 09:26:17 UTC
Raw Date: Sun, 11 May 1997 17:26:17 +0800

Raw message

From: daw@cs.berkeley.edu (David Wagner)
Date: Sun, 11 May 1997 17:26:17 +0800
To: cypherpunks@cyberpass.net
Subject: Money orders, debit cards, ...
Message-ID: <5l42hm$u44@joseph.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


Some court transcripts from the McVeigh case contain interesting
information about real-life anonymous systems.  See
    http://www.cnn.com/US/9703/okc.trial/transcripts/may/050697.eve.html

Did you know that money orders are not so anonymous as you might think?
On the order itself are digits identifying the post office where the
order was purchased, as well as the date of purchase.  Also, a private
company testified on their money order service, and it comes out that
they keep a computerized record of every money order purchase in a
central database.  Eek.

And read about a real-life instance of traffic analysis of phone calls
based on timing correlations.  This one really happened, folks (though
it was by mistake).  Also, read about how a company offering prepaid
debit cards searched through billions of records to find all phone calls
to or from a certain number, etc.  Read about how they entered a disk
containing information on 100,000--200,000 phone calls (!) into evidence.
(Note: contents of calls are protected by law, but traffic analysis
specifically is allowed, far as I can tell.)

And you value your privacy?  Too bad!






Thread