1994-09-12 - Re: Running PGP on Netcom (and Similar)

Header Data

From: Brad Huntting <huntting@glarp.com>
To: tcmay@netcom.com (Timothy C. May)
Message Hash: db186f46131621ba223c04c64a73b3f7a3c4c184182333aaae21e49fb40b4606
Message ID: <199409121441.IAA11650@misc.glarp.com>
Reply To: <199409120049.RAA15757@netcom11.netcom.com>
UTC Datetime: 1994-09-12 14:47:36 UTC
Raw Date: Mon, 12 Sep 94 07:47:36 PDT

Raw message

From: Brad Huntting <huntting@glarp.com>
Date: Mon, 12 Sep 94 07:47:36 PDT
To: tcmay@netcom.com (Timothy C. May)
Subject: Re: Running PGP on Netcom (and Similar)
In-Reply-To: <199409120049.RAA15757@netcom11.netcom.com>
Message-ID: <199409121441.IAA11650@misc.glarp.com>
MIME-Version: 1.0
Content-Type: text/plain



> A "Cypherpunk RISK" (apologies to the "RISKS" list) to running PGP on
> Netcom, Portal, America Online, etc. systems (and on university,
> corporate, etc. systems), is the obtaiing of *all* records,
> directories, etc. by court order.

> This has happened more than once, and will likely happen more and more
> in the future, as law enforcement realizes what a treasure trove this
> can be.

I am under the impression that many if not all Internet providers
which provide interactive logins have been raided durring the past
year.  The raids I know of were conducted by U S Marshalls acting
on behalf of a few large electronics firms (who just happen to all
have the same intelectual property atourney).


brad





Thread