1995-11-05 - Re: lp (134.222.35.2)?

Header Data

From: Ernest Hua <hua@xenon.chromatic.com>
To: cypherpunks@toad.com
Message Hash: c335b12502aa1d29008eee9f14189f80f6ee0c4c075199c850e9cb66bf78be09
Message ID: <199511050653.WAA17662@xenon.chromatic.com>
Reply To: N/A
UTC Datetime: 1995-11-05 07:02:13 UTC
Raw Date: Sun, 5 Nov 1995 15:02:13 +0800

Raw message

From: Ernest Hua <hua@xenon.chromatic.com>
Date: Sun, 5 Nov 1995 15:02:13 +0800
To: cypherpunks@toad.com
Subject: Re: lp (134.222.35.2)?
Message-ID: <199511050653.WAA17662@xenon.chromatic.com>
MIME-Version: 1.0
Content-Type: text/plain


You don't really need a special (and clearly suspicious) IP address to
perform driftnet fishing.  All you need is to be sure that all physical
packets pass through a checkpoint charlie and just park a sniffer there
to watch everything fly by.

On the other hand, it would be interesting to see how hard NSA pushes
behind the scenes to have physical long distance cables run through the
US routers/switches (in the name of US national security, of course).

It would be fun (perhaps horrible) to see what the NSA does the first
time Isreal or France set up their own high capacity long distance to
other friendly/unfriendly countries (thus bypassing the US completely).
Second, let France or some other country set up major Internet routing
clearinghouses which advertise secure routes to other nations (not US).

Ern





Thread