From: Theodore Ts’o <tytso@Athena.MIT.EDU>
To: Peter Honeyman <honey@citi.umich.edu>
Message Hash: a619d501f2a5aae6c7300f4f62d83889af1af83b1aad90783fcd94e5705334e3
Message ID: <9303041824.AA26578@SOS>
Reply To: <9303041605.AA16665@toad.com>
UTC Datetime: 1993-03-04 18:26:19 UTC
Raw Date: Thu, 4 Mar 93 10:26:19 PST
From: Theodore Ts'o <tytso@Athena.MIT.EDU>
Date: Thu, 4 Mar 93 10:26:19 PST
To: Peter Honeyman <honey@citi.umich.edu>
Subject: Re: You Aren't [I'm Not]
In-Reply-To: <9303041605.AA16665@toad.com>
Message-ID: <9303041824.AA26578@SOS>
MIME-Version: 1.0
Content-Type: text/plain
From: Peter Honeyman <honey@citi.umich.edu>
Date: Thu, 4 Mar 93 11:03:53 EST
ted, i think that with just a little of the right technical stuff, it is
very easy to establish a nym in today's nets. e.g., if you buy a cheap
unix box, it comes with uucp, so you can hook up to one of many anonymous
uucp sites.
that's easy.
Buying a unix box and finding a UUCP connection is still a lot more
effort than getting a new anonymous remailer pseudomnym. It certainly
costs a lot more money! And if you continuously mailbomb someone, the
victim still has the (somewhat tenuous) recourse of asking the upstream
uucp site to cut off the miscreant.
There are controls to reduce how much someone can abuse the network.
i know of several slip/ppp endpoints that aren't password protected. more
every day, in fact.
that's easy.
And if those endpoints were abused, the owners of said endpoints would
probably clamp down and protect them. (If they're used too much, they'd
probably clamp down anyway, since presumably they didn't pay good money
for those resources to give them away free to anyone who can dail up to
them.)
There are controls to reduce how much someone can abuse the network.
You seem to be proposing that all such controls be removed.
- Ted
Return to March 1993
Return to “Theodore Ts’o <tytso@Athena.MIT.EDU>”