From: m5@vail.tivoli.com (Mike McNally)
To: cypherpunks@toad.com
Message Hash: 330d3da8c7119fdb05423959752322116b8bbc18055560098b72e287fb7a86fb
Message ID: <9311032108.AA20464@vail.tivoli.com>
Reply To: N/A
UTC Datetime: 1993-11-03 21:12:21 UTC
Raw Date: Wed, 3 Nov 93 13:12:21 PST
From: m5@vail.tivoli.com (Mike McNally)
Date: Wed, 3 Nov 93 13:12:21 PST
To: cypherpunks@toad.com
Subject: re: Internet "mailing list"
Message-ID: <9311032108.AA20464@vail.tivoli.com>
MIME-Version: 1.0
Content-Type: text/plain
(Hoping I don't get yelled at (TYPED at?) for something not suitably
cypherpunkish...)
I wonder if the Internet mailing list people have "ringers" in the
list? They could set up accounts on netcom and other services, I
suppose, and just keep a .forward file there. Of course, if one stole
the list (or bought 1 use and decided to keep using it) but sent all
mail through an anonymous remailer, that wouldn't do them much good
(not that mailing through an anonymous remailer could do much good to
a business abusing the list in an attempt to make a profit.)
I wonder whether any well-used anonymous addresses are in it? One
could, in principle, compile quite useful demographic information
about a nym. And what if (gasp! shudder! my fluids!) several names
in the list map to one real user? Could the purchaser of the list
demand a partial refund?
--
Mike McNally
Return to November 1993
Return to “m5@vail.tivoli.com (Mike McNally)”
1993-11-03 (Wed, 3 Nov 93 13:12:21 PST) - re: Internet “mailing list” - m5@vail.tivoli.com (Mike McNally)