wiretapping techniques

Jim Meritt jwm at stdc.jhuapl.edu
Wed Jul 27 07:26:19 AEST 1988


In article <16625 at brl-adm.ARPA> roberts at cmr.icst.nbs.gov (John Roberts) writes:
}As an example of a more reasonable approach, if you should happen to 
}discover a way to break into any Unix system, DO NOT post it to the net
}as a public service. You might quietly send a note to the designers, and
}they might come up with a patch and quietly distribute it, perhaps without
}even saying what it's for, and everyone can laugh about the situation
}afterward. For situations where the problem is unlikely to be fixed
}(wiretapping, etc.), EXTREME caution should be used in informing the users 
}that there is a security problem.


You look at comp.risks & sci.crypt?




Disclaimer: Individuals have opinions, organizations have policy.
            Therefore, these opinions are mine and not any organizations!
Q.E.D.
jwm at aplvax.jhuapl.edu 128.244.65.5  (James W. Meritt)



More information about the Comp.unix.questions mailing list