[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: more Internic nightmare (fwd)
- To: firstname.lastname@example.org
- Subject: Re: more Internic nightmare (fwd)
- From: Michael Dillon <email@example.com>
- Date: Tue, 23 Mar 1999 19:16:20 -0800 (PST)
- Organization: Memra Communications Inc.
---------- Forwarded message ----------
Date: Tue, 23 Mar 1999 20:46:04 -0500
From: "Jay R. Ashworth" <firstname.lastname@example.org>
Subject: Re: more Internic nightmare
On Tue, Mar 23, 1999 at 04:59:45PM -0800, Derek Balling wrote:
> Unless you're planning on enforcing passwords for contacts then I don't
> think it'd take all that much to SIMULATE a client, choosing random people
> from the whois database, and blaming other people for your whois queries.
> An even more intelligent system would use the tech contact for the LAST
> result as the requestor for the current one so that there would be no
> visible pattern.
> The source code for the client is going to be out there, so people will
> figure out how it works, reverse engineer a version that uses a forged,
> but existing, tech contact, and go on with their day.
Can we say "PGP"? C'mon, folks; the engineering solutions to these
problems are _trivial_. What is _not_ trivial is working the political
process to bring pressure to bear on Netsol to make them _possible_.
Jay R. Ashworth email@example.com
Member of the Technical Staff Buy copies of The New Hackers Dictionary.
The Suncoast Freenet Give them to all your friends.
Tampa Bay, Florida http://www.ccil.org/jargon/ +1 813 790 7592