1994-05-26 - Re: Unicorn vs. tmp@netcom

Header Data

From: “Jim Sewell” <jims@Central.KeyWest.MPGN.COM>
To: unicorn@access.digex.net (Black Unicorn)
Message Hash: 8f82fce987e9caaf2bf52d8f1607df2e34d4be70b7a5e57ed0cf48e557040697
Message ID: <9405261722.AA13675@Central.KeyWest.MPGN.COM>
Reply To: <199405261638.AA23173@access3.digex.net>
UTC Datetime: 1994-05-26 17:22:54 UTC
Raw Date: Thu, 26 May 94 10:22:54 PDT

Raw message

From: "Jim Sewell" <jims@Central.KeyWest.MPGN.COM>
Date: Thu, 26 May 94 10:22:54 PDT
To: unicorn@access.digex.net (Black Unicorn)
Subject: Re: Unicorn vs. tmp@netcom
In-Reply-To: <199405261638.AA23173@access3.digex.net>
Message-ID: <9405261722.AA13675@Central.KeyWest.MPGN.COM>
MIME-Version: 1.0
Content-Type: text/plain

<In mail Black Unicorn said:>
> It would be an easy matter for me to expose his identity, his work, his 
> finances, I have and will not.

  Not that I would suggest anyone to do this, but I do wonder if the
  information obtained for the court case is public knowlege or is it
  in a 'sealed' file?  Knowing nothing of law I haven't a clue, but if
  it is public information then another cypherpunk might find it an
  equally easy matter to expose the id, work, finances, etc of the
  tmp@netcom.com person.

  Not that I would suggest doing this.


 Tantalus Inc.          Jim Sewell      Amateur Radio: KD4CKQ
 P.O. Box 2310          Programmer           Internet: jims@mpgn.com
 Key West, FL 33045     C-Unix-PC          Compu$erve: 71061,1027
 (305)293-8100                            PGP via email on request. 
 1K-bit Fingerprint: 8E 14 68 90 37 87 EF B3  C4 CF CD 9A 3E F9 4A 73