From: karn@qualcomm.com (Phil Karn)
To: tcmay@netcom.com
Message Hash: f2df911a370e1adce562da7cb04f5fb7445aa3d7243df3df942bc87688cbd5d2
Message ID: <9306251019.AA13652@servo>
Reply To: N/A
UTC Datetime: 1993-06-25 10:21:16 UTC
Raw Date: Fri, 25 Jun 93 03:21:16 PDT
From: karn@qualcomm.com (Phil Karn)
Date: Fri, 25 Jun 93 03:21:16 PDT
To: tcmay@netcom.com
Subject: Re: Weak stenography.
Message-ID: <9306251019.AA13652@servo>
MIME-Version: 1.0
Content-Type: text/plain
Tim May:
>Some solutions:
>1. Make programs like "readdat.exe" ubiquitous...distribute them on
>shareware disks, CD-ROMs, etc. Thus, many households and offices will
>have "readdat.exe"-like programs, whether they use them or not. Mere
I like this idea, as long as the mere possession of such programs
isn't also criminalized. Don't laugh -- the government actually seems
to think that they can enforce laws banning the mere private
possession of certain types of bit patterns, like child pornography.
I have about two dozen CD-ROMs on my shelf, containing the usual
oodles of gigabytes of stuff. Mostly mirrors of anonymous FTP archives
and shareware BBSes. So far I have read only a tiny fraction of the
bits on those disks, and I expect I'll never read much more. There's
no reasonable way I could be expected to know if there isn't a
contraband file or two buried in all those gigabytes. But consider the
Akron BBS operator who got busted for a file that somebody had
uploaded to his machine, transferred off to backup and forgotten. I
wonder how many similar files have already made it to CD-ROM?
Makes me kind of wish I had bought all my computer equipment and
software anonymously, for cash...
Phil
Return to June 1993
Return to “karn@qualcomm.com (Phil Karn)”
1993-06-25 (Fri, 25 Jun 93 03:21:16 PDT) - Re: Weak stenography. - karn@qualcomm.com (Phil Karn)