1995-08-18 - Article in Time Magazine

Header Data

From: danisch@ira.uka.de (Hadmut Danisch)
To: cypherpunks@toad.com
Message Hash: bcbc91fcf3e5f0e6b52104ab9c3d662cf92682f4a38737b5725b4758724d7e42
Message ID: <9508181150.AA03711@elysion.iaks.ira.uka.de>
Reply To: N/A
UTC Datetime: 1995-08-18 11:54:32 UTC
Raw Date: Fri, 18 Aug 95 04:54:32 PDT

Raw message

From: danisch@ira.uka.de (Hadmut Danisch)
Date: Fri, 18 Aug 95 04:54:32 PDT
To: cypherpunks@toad.com
Subject: Article in Time Magazine
Message-ID: <9508181150.AA03711@elysion.iaks.ira.uka.de>
MIME-Version: 1.0
Content-Type: text/plain


In the Time Magazine of this week there is an article about a new way
to make war. Instead of sending bombs, tanks, and soldiers, the
enemies computers and communication networks are attacked by sending
viruses and worms and by using backdoors to sabotage the infra structure.

How many exported software products might have backdoors,
vulnerabilities, and hidden procedures which are harmfull if ever
activated?

Any opinions?

Hadmut 







Thread