1994-12-23 - Re: Breaking into girlfriend’s files

Header Data

From: Black Unicorn <unicorn@access.digex.net>
To: “L. McCarthy” <lmccarth@thor.cs.umass.edu>
Message Hash: 845d7a2102ad608ce7d444bcb8a1eb41f65e1794ae803162c93a13a1690290a3
Message ID: <Pine.SUN.3.91.941222223740.8591A-100000@access1.digex.net>
Reply To: <199412230045.TAA21904@thor.cs.umass.edu>
UTC Datetime: 1994-12-23 03:43:02 UTC
Raw Date: Thu, 22 Dec 94 19:43:02 PST

Raw message

From: Black Unicorn <unicorn@access.digex.net>
Date: Thu, 22 Dec 94 19:43:02 PST
To: "L. McCarthy" <lmccarth@thor.cs.umass.edu>
Subject: Re: Breaking into girlfriend's files
In-Reply-To: <199412230045.TAA21904@thor.cs.umass.edu>
Message-ID: <Pine.SUN.3.91.941222223740.8591A-100000@access1.digex.net>
MIME-Version: 1.0
Content-Type: text/plain


On Thu, 22 Dec 1994, L. McCarthy wrote:

> Date: Thu, 22 Dec 1994 19:45:17 -0500 (EST)
> From: L. McCarthy <lmccarth@thor.cs.umass.edu>
> To: cypherpunks@toad.com
> Subject: Re: Breaking into girlfriend's files
> 
> Dave Horsfall writes:
> > ADAM GERSTEIN, _THE_ MACGURU writes:
> > > A friend of mine thinks his girlfriend has been cheating on him, and
> > > thinks the proof may be in a few Norton Encrypt files.  Is there anyway
> > > to get the password with a data/resource editor, or is he shit-out-of-luck
> > Boy; talk about an inappropriate use of technology...  Is "privacy"
> > in that guy's vocabulary?  I respectfully submit that if he has to
> > start snooping on her, the relationship is over anyway.
> 
> My sentiments exactly. Whether or not she's two-timing, I imagine she'd be
> pretty upset (and justifiably so) if she knew her boyfriend wants to break
> into her private documents. He should *ask* her straight out to confirm or
> deny his suspicions. If he doesn't like the answer, he should get out.
> 
> Someone needs to give her PGP ASAP, IMHO....
> 
> -L. Futplex McCarthy
> 

As darwinian as it seems, perhaps someone should just tell the guy how to 
bust Norton's encryption, eh?

Since when are cypherpunks relationship counslers?

If she gets burned using norton encrypt, perhaps she'll take the time to 
learn about real encryption.  (I assume Norton's is trash)

Short term privacy loss perhaps, but long term gain.

If it were to be otherwise, I guess we all better stop posting crypto 
weaknesses at all, afterall, who knows what girlfriend will next be 
violated if we tell joe hacker how to break e.g., enigma.

While everyone is at it, why not just subscribe wholeheartedly to the 
security through obscurity doctrine...?

The more I think about the above, the more I wonder if those on the list 
have conflicting goals, that is, absolute privacy by agreement.  Are we 
really that naive?  If so, why develop crypto at all?

-uni- (Dark)


073BB885A786F666 nemo repente fuit turpissimus - potestas scientiae in usu est
6E6D4506F6EDBC17 quaere verum ad infinitum, loquitur sub rosa    -    wichtig!






Thread