From: “Perry E. Metzger” <perry@imsi.com>
To: cypherpunks@toad.com
Message Hash: 63ea3ceb676bb518a3f93b138ec7f6b82c4c65aa0014303551a7ba7ac2ef3598
Message ID: <9406201250.AA05130@snark.imsi.com>
Reply To: <199406181628.AA06095@srl03.cacs.usl.edu>
UTC Datetime: 1994-06-20 12:50:14 UTC
Raw Date: Mon, 20 Jun 94 05:50:14 PDT
From: "Perry E. Metzger" <perry@imsi.com>
Date: Mon, 20 Jun 94 05:50:14 PDT
To: cypherpunks@toad.com
Subject: Re: Another Cellular Victim
In-Reply-To: <199406181628.AA06095@srl03.cacs.usl.edu>
Message-ID: <9406201250.AA05130@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
"Phil G. Fraering" says:
> I was on a trip out of town a while back... as soon as I crossed
> into another cellular network boundary, I got a call from the
> provider's sales droid, telling me how to use their service. They
> _are_ tracking individual phone movement, IMHO.
Tracking individual phone movement is how cellphones work. Of course
they are tracking you. How else could you get calls?
.pm
Return to June 1994
Return to ““Phil G. Fraering” <pgf@srl.cacs.usl.edu>”