1993-10-13 - Re: Spread Spectrum Nets (Way to do safely)

Header Data

From: wcs@anchor.ho.att.com (Bill_Stewart_HOY0021305)
To: cypherpunks@toad.com
Message Hash: 3cc8e75e2e3649856ce3449cb67578f305d2db95be45e7c9620e17709ead8ccd
Message ID: <9310131541.AA22489@anchor.ho.att.com>
Reply To: _N/A

UTC Datetime: 1993-10-13 15:42:03 UTC
Raw Date: Wed, 13 Oct 93 08:42:03 PDT

Raw message

From: wcs@anchor.ho.att.com (Bill_Stewart_HOY002_1305)
Date: Wed, 13 Oct 93 08:42:03 PDT
To: cypherpunks@toad.com
Subject: Re: Spread Spectrum Nets (Way to do safely)
Message-ID: <9310131541.AA22489@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text/plain


Robert Woodhead writes:
> Succinctly, use the purloined letter technique -- hide it in plain sight.
> There are RF bands set aside for unlicensed low-power operation; some
> new phones use spread-spectrum techniques in these bands.

It's more than just purloined-letter issues - it's *legal*.
That means that the FCC won't be triangulating around to find and destroy
your transmitters, which is good.  So you're back to threats from
the CIA/DEA/NSA/FBI, pigeons, vandals, etc., and encryption and spread-spectrum
make it a lot easier to avoid problems from frustrated cops.






Thread