From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: f55cfc5d56f74392287d03d2969afd8f2b2916e4ef258ed2eb15a4fe065b1b5a
Message ID: <199510031308.JAA10163@pipe1.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-10-03 13:18:06 UTC
Raw Date: Tue, 3 Oct 95 06:18:06 PDT
From: John Young <jya@pipeline.com>
Date: Tue, 3 Oct 95 06:18:06 PDT
To: cypherpunks@toad.com
Subject: Telco Blob
Message-ID: <199510031308.JAA10163@pipe1.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Financial Times of October 3 has a humongous 40-page insert
on international telecommunications -- markets, business,
technology, and, to be sure, the tele-players lying,
cheating, fearing the "computer hacking industry,"
whimpering with delirious greed at the bountiful,
multicultured consumer's mindless credulity of tekkie-
gadgets. For the mil-beguiled Colin Powells there's even a
colored global map of Big Blob telco strategic rapacity.
A tiny cheering blip of machine-wash-n-readable T-stupidity
on p. 34:
Sutton dismisses worries out security -- despite a
recent successful attempt to break the security on
Internet financial transactions. An incident in August,
when a researcher at the French National Institute of
Computer Science and Control (INRIA) broke into the
Internet security system, raised concerns about
security.
"A lot of security is about perception -- after all,
every code can be broken. The INRIA incident only
involved breaking a single code and needed massive
computer resources to do it," says Mr Sutton.
Return to October 1995
Return to “John Young <jya@pipeline.com>”
1995-10-03 (Tue, 3 Oct 95 06:18:06 PDT) - Telco Blob - John Young <jya@pipeline.com>