Path: news.nzbot.com!spool1.sonic-news.com!news-out.sonic-news.com!not.news-service.com!not.alt.net!not.highwinds-media.com!s02-b78!textbe01-phx!hwmnpeer02.phx!hw-filter.phx!hwmnpeer01.phx!hwmnpeer01.lga!hwmnpeer01.ams!news.highwinds-media.com!news.astraweb.com!newsrouter-eu.astraweb.com!proxad.net!feeder1-1.proxad.net!club-internet.fr!feedme-small.clubint.net!aioe.org!not-for-mail
From: floppy <floppy@flop.com>
Newsgroups: alt.fan.utb.naughty-boy
Subject: Ping VV concerning passwords
Date: Sat, 12 Apr 2008 09:30:37 -0400
Organization: Aioe.org NNTP Server
Lines: 29
Message-ID: <ftpl0m$drc$1@aioe.org>
NNTP-Posting-Host: Ovr4vs5K83lrGOzsNh3V9A.user.aioe.org
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Complaints-To: abuse@aioe.org
X-No-Archive: Yes
Xref: news.nzbot.com alt.fan.utb.naughty-boy:1427
X-Received-Date: Sat, 17 Oct 2009 21:26:43 UTC (s02-b78)
I'm posting this here for your info as a follow up to the thread on
this topic in another place - I can't post there at present.
I am not at all certain all this passwording achieves much.
Even if it has its uses, the problem is it is encouraging
direct networking (the so-called "cells" - ROTFL! - of media lore) between
downloaders and posters. Just such networking was the root cause of the
recent bust in the girl groups. So it is possible that LEA love
these calls for downloaders to email posters, amd may actually be
encouraging the passwording for that very reason.
Hush says it logs IP addresses, and uses javascript. In fact any webmail
using javascript can grab IPs even when accessed through proxies.
This means you should never access hushmail from your own internet
account for high risk activities like emailing or receiving email
from anyone here. You need to be on a public access
computer without security cameras (watch out for vidcams too), or on an
open wlan preferably with your MAC address obfuscated (the more caution
the better, especially in the US and UK). According to some who have
posted, hush has handed over info in response to subpoenas, despite their
offshore base (and where are their servers anyway).
And I have no idea what the current password is, and can't see any of that
stuff.
|
|