Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: jaimie.nicholson@********.otago.ac.nz (Jaimie Nicholson)
Subject: Reading private mail
Date: Sat, 15 Jun 1996 14:24:41 +1200
>> Monitor overall load? Maybe. Where it went? I dont think so.

>No, It's more like "That chunk of data went off throught that SAN. Probably a
>message."

What about if you compromise the receiver's end? If you really want to read
someone's "*****Private" messages, couldn't you just put a tap in the line
just before their computer/telecom/whatever the hell they're using? Or in
the junction box thingy (that must be somewhere in the communications
system), if you can't tap fibre-optic cables directly. This procedure is
what I assumed was happening when the Renraku decker monitored some of
Ronin's mail, just before he was captured.

PLAYTHING OF A CRUEL GOD
JAIMIE NICHOLSON
Message no. 2
From: "Mark A. Imbriaco" <mark@******.net>
Subject: Re: Reading private mail
Date: Mon, 17 Jun 1996 13:40:53 -0400 (EDT)
> >> Monitor overall load? Maybe. Where it went? I dont think so.
>
> >No, It's more like "That chunk of data went off throught that SAN.
> >Probably a message."
>
> What about if you compromise the receiver's end? If you really want to read
> someone's "*****Private" messages, couldn't you just put a tap in the line
> just before their computer/telecom/whatever the hell they're using? Or in
> the junction box thingy (that must be somewhere in the communications
> system), if you can't tap fibre-optic cables directly. This procedure is
> what I assumed was happening when the Renraku decker monitored some of
> Ronin's mail, just before he was captured.

If the owner of the character wants to allow a PRIVATE message
to him to be monitored, he may. If not, then no matter of taps
or supercomputers will get the data or break the encryption. The
method that is used if the owner okays the monitoring is pretty
much irrelevant.

-Mark
Message no. 3
From: Brian Rogers <rogers@****.uiuc.edu>
Subject: Re: Reading private mail
Date: Mon, 17 Jun 1996 14:14:22 -0500
> If the owner of the character wants to allow a PRIVATE message
> to him to be monitored, he may. If not, then no matter of taps
> or supercomputers will get the data or break the encryption. The
> method that is used if the owner okays the monitoring is pretty
> much irrelevant.

If anyone cares, there is a group of deckers that monitor's Jason's / Kor's
mail at all times. Thats why sometimes I will have conversations with
Trixie or Trax where the time stamps are sometime posted BEFORE I finished
writing a mail message to them.

This is also why I dont mind that group of deckers knowing whats going
on behind the scenes. If I dont add extra outside encryption (the mail
I sent to nightmare was encrypted) they can read it all.

Further Reading

If you enjoyed reading about Reading private mail, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.