1993-11-03 - TRW PhonePrint (fwd)

Header Data

From: “Alan (Gesture Man) Wexelblat” <wex@media.mit.edu>
To: remail@tamsun.tamu.edu
Message Hash: cb7322ee1d4aded6393812b78c98be1faf625106a44f95a9330f70331e3c7112
Message ID: <9311031647.AA17745@media.mit.edu>
Reply To: <9311031045.AA09792@tamsun.tamu.edu>
UTC Datetime: 1993-11-03 16:52:25 UTC
Raw Date: Wed, 3 Nov 93 08:52:25 PST

Raw message

From: "Alan (Gesture Man) Wexelblat" <wex@media.mit.edu>
Date: Wed, 3 Nov 93 08:52:25 PST
To: remail@tamsun.tamu.edu
Subject: TRW PhonePrint (fwd)
In-Reply-To: <9311031045.AA09792@tamsun.tamu.edu>
Message-ID: <9311031647.AA17745@media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain


This sounds like they're matching access codes to physical devices.  Does
that mean I can't use someone else's cellphone?

If this "fingerprint" signal is transmitted continuously, does this mean
that it's now easier to track cellphone users?

How long before someone makes a black box to spoof these signals?

--Alan Wexelblat, Reality Hacker, Author, and Cyberspace Bard
Media Lab - Advanced Human Interface Group	wex@media.mit.edu
Voice: 617-258-9168, Pager: 617-945-1842	PUBLIC KEY available by request
Try not to have a good time ... This is supposed to be educational.





Thread