[13144] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A New Way to Catch a Hacker

daemon@ATHENA.MIT.EDU (tpurdy@newsguy.com)
Wed Apr 30 08:13:14 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: tpurdy@newsguy.com
To: cryptography@metzdowd.com
Date: Tue, 29 Apr 2003 20:49:44 -0600
Reply-To: tpurdy@newsguy.com
In-Reply-To: <4.2.2.20030428151849.00b1dcd0@mail.earthlink.net>

On Mon, 28 Apr 2003 15:22:00 -0600, Anne & Lynn Wheeler
<lynn@garlic.com> wrote:

>haven't map makers been doing this forever ... little out-of-the-way places 
>on their maps ... that don't actually exist ... and would only show up 
>elsewhere in cases likely involving legal issue.
>
>At 01:55 PM 4/28/2003 -0400, R. A. Hettinga wrote:
>><http://www.nytimes.com/2003/04/28/technology/28NECO.html?tntemail0=&pagewa 
>>nted=print&position=>

People that deal in postal mailing lists do this also.  Their clients
contract to use the names on the lists a certain number of times, and no
more.  A percentage of the addresses in the lists are "seeds", which
allow the list vendor to track how their lists are being used.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post