From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: ec72e5d64234c5e57e9c236ce7708a01f3b47dbc86602ef9313b5916c2b64312
Message ID: <199601121737.MAA22857@pipe6.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-01-12 17:38:08 UTC
Raw Date: Fri, 12 Jan 96 09:38:08 PST
From: John Young <jya@pipeline.com>
Date: Fri, 12 Jan 96 09:38:08 PST
To: cypherpunks@toad.com
Subject: Toad Sex
Message-ID: <199601121737.MAA22857@pipe6.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
The oldest and most trustworthy way to crack crypto --
and a cryptologist -- is sex, regularly employed by
royalty and traitors, tyrants and anarchists, governments
and bandits, warfighters and jealous lovers, spouses and
businesses, and whatever other position/opposition
pleasures and betrays.
If you have a security system that does not protect
against it you're really fucked.
Just who is doing what to who in "Takedown" constitutes
its shameless Hollywoodian prurience, as it was in
Littman, Clancy, Vinge, Tolstoy, the Bible, the Koran,
the Kama Sutra, any indecent Exon-prohibition of your
dreams.
Shimomura, Markoff, Mitnick -- are the games of seductive
illusion they're playing so different from vaunted
cryptography of the ever-randy, coy/decoy Net?
Has nobody ever blurted their password in the throes of
passionate words?
Imagine Toad Hall and what was up in the hot tub.
Return to January 1996
Return to “John Young <jya@pipeline.com>”
1996-01-12 (Fri, 12 Jan 96 09:38:08 PST) - Toad Sex - John Young <jya@pipeline.com>