From: sameer <sameer@c2.org>
To: zinc@zifi.genetics.utah.edu (zinc)
Message Hash: b4c939f3ef7bb1efe0461161763a6f94e22a8929b5acb68b1f394bfdd391f555
Message ID: <199601292359.PAA24832@infinity.c2.org>
Reply To: <Pine.LNX.3.91.960129141757.184E-100000@zifi.genetics.utah.edu>
UTC Datetime: 1996-01-30 02:34:11 UTC
Raw Date: Tue, 30 Jan 1996 10:34:11 +0800
From: sameer <sameer@c2.org>
Date: Tue, 30 Jan 1996 10:34:11 +0800
To: zinc@zifi.genetics.utah.edu (zinc)
Subject: Re: FV Demonstrates Fatal Flaw in Software Encryption of Credit Cards
In-Reply-To: <Pine.LNX.3.91.960129141757.184E-100000@zifi.genetics.utah.edu>
Message-ID: <199601292359.PAA24832@infinity.c2.org>
MIME-Version: 1.0
Content-Type: text/plain
> the point is not that this can be done, the point is that users need
> tools that would check for programs like this running on their
> system. is fv making a 'fix' available? i would imagine a 'fix'
> would be a program that would look for tsr type programs (or inits on
> a mac) that do this sort of thing.
Of course they won't. FV's claimed "fix" is their product,
which is a joke of appayment system. You actually think they would
release a virus checker that would effectively hurt their FUD-based
marketing?
> it's disapointing to see the spin put on this by fv. instead of
Its not surprising, given FV's attitude.
--
Sameer Parekh Voice: 510-601-9777x3
Community ConneXion, Inc. FAX: 510-601-9734
The Internet Privacy Provider Dialin: 510-658-6376
http://www.c2.org/ (or login as "guest") sameer@c2.org
Return to February 1996
Return to “zinc <zinc@zifi.genetics.utah.edu>”