1998-02-18 - RE: I was auto-outed by an IMG tag in HTML spam

Header Data

From: “Trei, Peter” <ptrei@securitydynamics.com>
To: “‘Anonymous’” <cypherpunks@toad.com
Message Hash: ea5ed5297fadb410b4b16202a3333922e7512fc6f29c45bb2d43f1bbd104be15
Message ID: <6B5344C210C7D011835C0000F8012766010035D1@exna01.securitydynamics.com>
Reply To: N/A
UTC Datetime: 1998-02-18 15:19:48 UTC
Raw Date: Wed, 18 Feb 1998 07:19:48 -0800 (PST)

Raw message

From: "Trei, Peter" <ptrei@securitydynamics.com>
Date: Wed, 18 Feb 1998 07:19:48 -0800 (PST)
To: "'Anonymous'" <cypherpunks@toad.com
Subject: RE: I was auto-outed by an IMG tag in HTML spam
Message-ID: <6B5344C210C7D011835C0000F8012766010035D1@exna01.securitydynamics.com>
MIME-Version: 1.0
Content-Type: text/plain


This can also happen with embedded tags in news messages,
if you use Netscape to read news while 'autoload images'
is turned on.

It's an interesting form of entrapment. 

Peter

> -----Original Message-----
> From:	Anonymous [SMTP:anon@anon.efga.org]
	[Trei, Peter]  [edited]
> They sent a message to my
> off-site address (along with those of other critics about whom
> they wanted to know more).  It was an HTML message with an
> embedded IMG tag.
> 
> When Netscape saw that IMG
> tag, it happily connected to marketing's "customer" tracking
> server, and downloaded the keyed graphic.
> 
> My boss just let me see the log he got from the marketing VP,
> showing clearly that my workstation read the message.  





Thread