From: | Brian Rogers <rogers@****.uiuc.edu> |
---|---|
Subject: | Re: Reading private mail |
Date: | Mon, 17 Jun 1996 14:14:22 -0500 |
> to him to be monitored, he may. If not, then no matter of taps
> or supercomputers will get the data or break the encryption. The
> method that is used if the owner okays the monitoring is pretty
> much irrelevant.
If anyone cares, there is a group of deckers that monitor's Jason's / Kor's
mail at all times. Thats why sometimes I will have conversations with
Trixie or Trax where the time stamps are sometime posted BEFORE I finished
writing a mail message to them.
This is also why I dont mind that group of deckers knowing whats going
on behind the scenes. If I dont add extra outside encryption (the mail
I sent to nightmare was encrypted) they can read it all.