From: wcs@anchor.ho.att.com (Bill_Stewart_HOY0021305)
To: cypherpunks@toad.com
Message Hash: 3cc8e75e2e3649856ce3449cb67578f305d2db95be45e7c9620e17709ead8ccd
Message ID: <9310131541.AA22489@anchor.ho.att.com>
Reply To: _N/A
UTC Datetime: 1993-10-13 15:42:03 UTC
Raw Date: Wed, 13 Oct 93 08:42:03 PDT
From: wcs@anchor.ho.att.com (Bill_Stewart_HOY002_1305)
Date: Wed, 13 Oct 93 08:42:03 PDT
To: cypherpunks@toad.com
Subject: Re: Spread Spectrum Nets (Way to do safely)
Message-ID: <9310131541.AA22489@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text/plain
Robert Woodhead writes:
> Succinctly, use the purloined letter technique -- hide it in plain sight.
> There are RF bands set aside for unlicensed low-power operation; some
> new phones use spread-spectrum techniques in these bands.
It's more than just purloined-letter issues - it's *legal*.
That means that the FCC won't be triangulating around to find and destroy
your transmitters, which is good. So you're back to threats from
the CIA/DEA/NSA/FBI, pigeons, vandals, etc., and encryption and spread-spectrum
make it a lot easier to avoid problems from frustrated cops.
Return to October 1993
Return to “[wcs@anchor.ho.att.com (Bill_Stewart_HOY0021305)](/authors/wcs_at_anchor_ho_att_com_bill_stewart_hoy002_1305)”