[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: taking electronic privacy into our own hands
- To: [email protected]
- Subject: Re: taking electronic privacy into our own hands
- From: [email protected]
- Date: Fri, 22 Dec 1995 12:26:58 -0800
- Comments: This message is NOT from the person listed in the Fromline. It is from an automated software remailing service operating atthat address.THE PORTAL SYSTEM DOES NOT CONDONE OR APPROVE OF THE CONTENTS OF THISPOSTING. Please report problem mail to <[email protected]>.
- Sender: [email protected]
On Fri, 15 Dec 1995, Eric Anderson wrote:
> Would it be possible to write a program ( i.e. a worm or
> Trojan) to ferret out personal information that is stored in databases
> and encrypt it?
>
> I was just wondering what such an undertaking would entail.
Actually, there is no need to write any such code.
AT&T distributes just such a beast to any and all comers. It can take
personal information and send it out over a secure socket layer.
I think a couple of partners in crime, Cheswick and Bellovin of AT&T
research had a hand in its continuing distribution.
> Eric
Alice de 'nonymous ... <[email protected]>
...just another one of those...
P.S. This post is in the public domain.
C. S. U. M. O. C. L. U. N. E.