From: werewolf@io.org (Mark Terka)
To: cypherpunks@toad.com
Message Hash: 7499e54dda93dac9dd23fb9e0fb75a9841449e8b638931ef71ffed230cefbd0f
Message ID: <JeZ-kOwscYeD075yn@io.org>
Reply To: <199412230045.TAA21904@thor.cs.umass.edu>
UTC Datetime: 1994-12-23 03:24:27 UTC
Raw Date: Thu, 22 Dec 94 19:24:27 PST
From: werewolf@io.org (Mark Terka)
Date: Thu, 22 Dec 94 19:24:27 PST
To: cypherpunks@toad.com
Subject: Re: Breaking into girlfriend's files
In-Reply-To: <199412230045.TAA21904@thor.cs.umass.edu>
Message-ID: <JeZ-kOwscYeD075yn@io.org>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
In article <199412230045.TAA21904@thor.cs.umass.edu>,
"L. McCarthy" <lmccarth@thor.cs.umass.edu> wrote:
>Dave Horsfall writes:
>> ADAM GERSTEIN, _THE_ MACGURU writes:
>> > A friend of mine thinks his girlfriend has been cheating on him, and
>> > thinks the proof may be in a few Norton Encrypt files. Is there anyway
>> > to get the password with a data/resource editor, or is he shit-out-of-luck
>> Boy; talk about an inappropriate use of technology... Is "privacy"
>> in that guy's vocabulary? I respectfully submit that if he has to
>> start snooping on her, the relationship is over anyway.
GROAN! What the hell is this list about anyway?????? I think we are losing
perspective about encryption, privacy etc etc...
Putting it quite simply, the individual was asking about how to make an attack
on an opponent. Whether that opponent is a girlfriend, spouse, competitor or
terrorist group, who cares? Lets save the sermonizing for Ann Landers...what
state the relationship is irrelevant.
The gentleman asked a question regarding a standard cryptographic problem...
how you can intercept and interpret encrypted information, either in theory
in practice. To make judgement calls is WAY out of line and a hell of a bad
precedent for this group.
I bet the poster would have gotten a more sympathetic response if he said he
had gotton his hands on a diplomatic cable....
>
>My sentiments exactly. Whether or not she's two-timing, I imagine she'd be
>pretty upset (and justifiably so) if she knew her boyfriend wants to break
>into her private documents. He should *ask* her straight out to confirm or
>deny his suspicions. If he doesn't like the answer, he should get out.
Oh boy! Pretty soon we will have this list as "cypherpunks giving advice to
the lovelorn..."!!! Lets cut the crap, stick to the problem at hand and
offer solutions to what the participants of the list know best, namely the
the use and analysis of cryptographic problems.
Save the relationship bullshit for Masters and Johnson....
>
>Someone needs to give her PGP ASAP, IMHO....
Sure, from a disspassionate point of view, I agree. But I thought that the
whole point of this list was the promotion of PGP and the discussion of
the pro's and con's of encryption in general. That should include attacking
as well as defense.
Since, how can you rationally discuss defense unless you know what kind of
attack your opponents can mount against you???????
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBLvo+sHBFBj7pSNyhAQEj8Qf/Yk+avezO8+bQw1vFBFht/STmhmHbXuVL
qtWiJhHdCJigsUyVAGWMgCBhZE6eWHgD0DylhIHywVK2Y2VvI0A6Vi1/Bk+rkviw
F2AFLJwV+td2yvoEVWCRL4kQlW7RLAuiYdJ2Vlb0Kw2Q8EkuxOcLiYXYAE/c6LTf
DNXc9238IbMoL+hbUzA3xkPL/S7LriRcNW9nzeCYHLt0SSkEn9mxd8c120jRz0aL
F33i7Fgnuy3OM5QUORxv78bjfzo6jBTXzW02ikp7YwtbDYv+RCt8b7dwmdJDHoV+
LtJ+qOV3pNk6UBUXMqeTig5Azi9NtVyh8MmhCozC0BaVuOxodcjkRA==
=VPdb
-----END PGP SIGNATURE-----
Return to December 1994
Return to “werewolf@io.org (Mark Terka)”