From: msprague@ridgecrest.ca.us
To: cypherpunks@toad.com
Message Hash: 504dfdbab14b185d392c0a9c670cf74247e2278d111e5f664aff524ef460a4ee
Message ID: <199612130514.VAA04501@owens.ridgecrest.ca.us>
Reply To: N/A
UTC Datetime: 1996-12-13 05:15:20 UTC
Raw Date: Thu, 12 Dec 1996 21:15:20 -0800 (PST)
From: msprague@ridgecrest.ca.us
Date: Thu, 12 Dec 1996 21:15:20 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: NEWS: Web Security Hole Revealed (opportunity?)
Message-ID: <199612130514.VAA04501@owens.ridgecrest.ca.us>
MIME-Version: 1.0
Content-Type: text/plain
>At 11:14 PM 12/11/96 -0500, you wrote:
>>X-Sender: okeefe@olympus.net
>>Mime-Version: 1.0
>>Date: Wed, 11 Dec 1996 19:32:32 -0800
>>To: N E W S R E L E A S E <IPS@olympus.net>
>>From: "Steve O'Keefe" <IPS@olympus.net>
>>Subject: NEWS: Web Security Hole Revealed
>>
>>BREAKING NEWS
>>For Release Thursday, December 12, 1996
>>
>>MAJOR WEB SECURITY FLAW REVEALED
>>
>>(New York) -- Edward Felten, head of Princeton University's
>>Safe Internet Programming Team (SIP), today revealed a
>>major security flaw in the Internet's World Wide Web.
>>Called "web spoofing," the breach allows any Internet
>>server to place itself between a user and the rest of the
>>web. In that middle position, the server may observe, steal
>>and alter any information passing between the unfortunate
>>browser and the web.
(deletia)
Wait a minuite; This sounds like an opportunity!
I see a possibility for a machine confugured to tx/rx PGP encrypted packets
to re-broadcast them with the machines IP.
This would become an anonymous ISP
Return to December 1996
Return to “msprague@ridgecrest.ca.us”
1996-12-13 (Thu, 12 Dec 1996 21:15:20 -0800 (PST)) - Re: NEWS: Web Security Hole Revealed (opportunity?) - msprague@ridgecrest.ca.us