From: anonymous-remailer@shell.portal.com
To: cypherpunks@toad.com
Message Hash: e92e74f6d5003083a6a80acab15cebcd0506839edff5743a80810b0ee28f02d5
Message ID: <199512222026.MAA21559@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1995-12-22 21:06:34 UTC
Raw Date: Sat, 23 Dec 1995 05:06:34 +0800
From: anonymous-remailer@shell.portal.com
Date: Sat, 23 Dec 1995 05:06:34 +0800
To: cypherpunks@toad.com
Subject: Re: taking electronic privacy into our own hands
Message-ID: <199512222026.MAA21559@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain
On Fri, 15 Dec 1995, Eric Anderson wrote:
> Would it be possible to write a program ( i.e. a worm or
> Trojan) to ferret out personal information that is stored in databases
> and encrypt it?
>
> I was just wondering what such an undertaking would entail.
Actually, there is no need to write any such code.
AT&T distributes just such a beast to any and all comers. It can take
personal information and send it out over a secure socket layer.
I think a couple of partners in crime, Cheswick and Bellovin of AT&T
research had a hand in its continuing distribution.
> Eric
Alice de 'nonymous ... <an455120@anon.penet.fi>
...just another one of those...
P.S. This post is in the public domain.
C. S. U. M. O. C. L. U. N. E.
Return to December 1995
Return to “anonymous-remailer@shell.portal.com”
1995-12-22 (Sat, 23 Dec 1995 05:06:34 +0800) - Re: taking electronic privacy into our own hands - anonymous-remailer@shell.portal.com