[1367] in bugtraq
Re: Network Monitoring and Control (announcement)
daemon@ATHENA.MIT.EDU (Marc Tamsky)
Sat Apr 1 00:09:01 1995
From: tamsky@ugcs.caltech.edu (Marc Tamsky)
Date: Fri, 31 Mar 1995 19:28:25 -0800
To: root@madhouse.com
Cc: bugtraq@fc.net
In-Reply-To: <Pine.3.89.9503310518.C96-0100000@madhouse.com> (message from root on Fri, 31 Mar 1995 05:46:28 -0500)
>>>>> On Fri, 31 Mar 1995 05:46:28 -0500, root <root@madhouse.com> said:
} Sure it a great hacking tool, and I wouldn't mind seeing a copy, but
} aside from the corporate/government use, I don't see where it has a
} jusitifable use.
It has a wonderful justifiable use:
It wakes people up to the fact that everything they do on the
internet is completely open to this sort of tool.
Use an encrypted session protocol if you want privacy or resistance to
hijacking -- or you can wait for IPng.
[Anyone have a URL for info on the IETF draft of IPng?]
} Am I the only one who feels this is an invasion of privacy?
Yes.
--
| Marc Tamsky --- <A href="http://www.ugcs.caltech.edu/~tamsky/">Click.<\A>
| Protect your rights: Learn, Use, And Practice safe encryption.