From: Jon Lasser <jlasser@rwd.goucher.edu>
To: Rich Graves <llurch@networking.stanford.edu>
Message Hash: 3de651433ff2fec19f507a920220ad8549c0eac6e9e7556f952253082474ecb7
Message ID: <Pine.SUN.3.91.951214171110.16699A-100000@rwd.goucher.edu>
Reply To: <Pine.ULT.3.91.951214104824.5962B-100000@Networking.Stanford.EDU>
UTC Datetime: 1995-12-14 23:09:50 UTC
Raw Date: Fri, 15 Dec 1995 07:09:50 +0800
From: Jon Lasser <jlasser@rwd.goucher.edu>
Date: Fri, 15 Dec 1995 07:09:50 +0800
To: Rich Graves <llurch@networking.stanford.edu>
Subject: Re: e-mail forwarding, for-pay remailers
In-Reply-To: <Pine.ULT.3.91.951214104824.5962B-100000@Networking.Stanford.EDU>
Message-ID: <Pine.SUN.3.91.951214171110.16699A-100000@rwd.goucher.edu>
MIME-Version: 1.0
Content-Type: text/plain
On Thu, 14 Dec 1995, Rich Graves wrote:
> > I suspect Sameer would be happy to open an account paid in advance in
> > small unmarked bills. AOL probably wouldn't.
>
> AOL will, however, accept a bogus name, address, and credit card number
> (as long as the checksum is correct) for the initial ten free hours plus
> however long it takes for the first bill to bounce.
Nope. Not anymore. Due to excessive fraud, they now check the credit
card information when you first provide it.
(This made it impossible for a client to subscribe on the day
after Thanksgiving, because AOL couldn't get through to the credit
verification through all the shoppers...)
For any nontrivial denomination, this leads me to believe that ecash will
be verified when online, not offline later.
Jon
------------------------------------------------------------------------------
Jon Lasser <jlasser@rwd.goucher.edu> (410)494-3072
Visit my home page at http://www.goucher.edu/~jlasser/
You have a friend at the NSA: Big Brother is watching. Finger for PGP key.
Return to December 1995
Return to “sameer <sameer@c2.org>”