From: Sandy <72114.1712@CompuServe.COM>
To: <cypherpunks@toad.com>
Message Hash: 3251ca196a39b4ff630d6b9e2872cacd4996936616d1eb64b1cca74327ddbe0e
Message ID: <93093017511372114.1712_FHF68-1@CompuServe.COM>
Reply To: _N/A
UTC Datetime: 1993-09-30 17:56:37 UTC
Raw Date: Thu, 30 Sep 93 10:56:37 PDT
From: Sandy <72114.1712@CompuServe.COM>
Date: Thu, 30 Sep 93 10:56:37 PDT
To: <cypherpunks@toad.com>
Subject: POISON PILL
Message-ID: <930930175113_72114.1712_FHF68-1@CompuServe.COM>
MIME-Version: 1.0
Content-Type: text/plain
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SANDY SANDFORT Reply to: ssandfort@attmail.com
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Punksters,
Here is probably one of those dumb questions we non-technical
types ask from time to time on this list. Please indulge me
though, in case there is something to it.
In today's America, we live under the constant threat of police
seizure of our computer equipment and other assets. Of course,
we can encrypt the information our files, but this is, at best, a
passive solution. Are there any positive actions we can take?
POISON PILL--What, if anything, can be done to booby-trap a
computer? Once the cops have a machine, one would expect that
they will paw through everything in it. In addition, they will
probably use the stolen computer for their own data processing
needs. What could be done have the computer screw up the cop's
data days, weeks or months after the seizure? Of course, I would
never do such a thing myself, nor would I advise anyone else to
do so. I do, however, have a passing academic interest in the
subject. Same for you folks too, right?
S a n d y
>>>>>> Please send e-mail to: ssandfort@attmail.com <<<<<<
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Return to October 1993
Return to “Sandy <72114.1712@CompuServe.COM>”