From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: eef57a2405650987dc30bfb356672f6a41c8299a362cb89939d3eea8d10a2005
Message ID: <63eFBe4w165w@bwalk.dm.com>
Reply To: <Pine.SUN.3.96.970813213346.8665A-100000@mariner.cris.com>
UTC Datetime: 1997-08-14 13:43:07 UTC
Raw Date: Thu, 14 Aug 1997 21:43:07 +0800
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 14 Aug 1997 21:43:07 +0800
To: cypherpunks@toad.com
Subject: Re: Hypothetical situation for networks
In-Reply-To: <Pine.SUN.3.96.970813213346.8665A-100000@mariner.cris.com>
Message-ID: <63eFBe4w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain
Mike Jones <Mkljones@cris.com> writes:
> A company does some R&D work, which it wishes to keep classified from
> competitors.
...
> Not wishing to use sneakernet type file transfer, they wish to pass
> confidential material from one network to the other using the Internet.
They should not be using the Internet not (only) because of security
considerations, but because of performance/reliability/availability
considerations.
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
Return to August 1997
Return to ““William H. Geiger III” <whgiii@amaranth.com>”