From: Pete Loshin <pete@loshin.com>
To: “cypherpunks@toad.com>
Message Hash: 5fcae9290026f064154e4f7ee8dca8a2db2defb1f9c2903fd72ec6f215f242e0
Message ID: <01BAC3F2.3D4F0240@ploshin.tiac.net>
Reply To: N/A
UTC Datetime: 1995-12-06 20:46:54 UTC
Raw Date: Wed, 6 Dec 95 12:46:54 PST
From: Pete Loshin <pete@loshin.com>
Date: Wed, 6 Dec 95 12:46:54 PST
To: "cypherpunks@toad.com>
Subject: Inherent Insecurity of Internet Commerce! (was RE: Secret Clearance)
Message-ID: <01BAC3F2.3D4F0240@ploshin.tiac.net>
MIME-Version: 1.0
Content-Type: text/plain
OK, I'll try again. First, as I recall, SECRET clearance
is actually not very high: when I got it, I had to answer
a bunch of questions (do you abuse illegal drugs? are
you now or have you ever been a member of any
organizations? have you ever been _arrested_ for anything?)
and fill out some forms and get fingerprinted. They
probably did a credit check, and that was about it.
Nobody I knew got any calls asking about my habits
(that is reserved for higher clearances).
So now I'll rename the thread again: "Inherent Insecurity
of Internet Commerce" -- <sarcasm>maybe now the NYT
will feature me on the front page for "discovering" this
inherent flaw in the Internet.</sarcasm>
My purpose in renaming the thread in the first place
was to start another thread relating to the types of
security in places like, say, Netscape or Spyglass
or CyberCash or First Virtual or Interramp or any
other ISP or software company. Because I want to
know how susceptible these companies are to hiring
the wrong people.
So, here's the "bug": if some agency of crime/espionage
wants to subvert any of these systems, all they need
do is employ the same blackmail/bribe techniques
used to recruit actual spies on some employees of
these companies. They then slip in some hacked
versions of the software with the good ones, or modify
distribution servers, or slip code into servers that
forwards every tenth credit card number somewhere.
Or how about getting a janitor to plug a wireless tap
into one of the major Internet backbones to sniff for
cc#s as well as interesting e-mail?
Also, since there's enough noise here already (and
even I don't see that much crypto-relevance) I won't
post again on this topic, but I am very interested in
hearing concrete examples of how Internet companies
are protecting themselves, and also in hearing about
specific instances of security failing (e.g., has anyone
ever found a tap on a backbone?)
-Pete Loshin
pete@loshin.com
Return to December 1995
Return to “Pete Loshin <pete@loshin.com>”
1995-12-06 (Wed, 6 Dec 95 12:46:54 PST) - Inherent Insecurity of Internet Commerce! (was RE: Secret Clearance) - Pete Loshin <pete@loshin.com>