floppy <floppy@flop.com> wrote in news:ftpl0m$drc$1@aioe.org:
> I'm posting this here for your info as a follow up to the thread on
> this topic in another place - I can't post there at present.
>
> I am not at all certain all this passwording achieves much.
>
> Even if it has its uses, the problem is it is encouraging
> direct networking (the so-called "cells" - ROTFL! - of media lore)
> between downloaders and posters. Just such networking was the root
> cause of the recent bust in the girl groups. So it is possible that LEA
> love these calls for downloaders to email posters, amd may actually be
> encouraging the passwording for that very reason.
>
> Hush says it logs IP addresses, and uses javascript. In fact any
> webmail using javascript can grab IPs even when accessed through
> proxies.
>
> This means you should never access hushmail from your own internet
> account for high risk activities like emailing or receiving email
> from anyone here. You need to be on a public access
> computer without security cameras (watch out for vidcams too), or on an
> open wlan preferably with your MAC address obfuscated (the more caution
> the better, especially in the US and UK). According to some who have
> posted, hush has handed over info in response to subpoenas, despite
> their offshore base (and where are their servers anyway).
>
> And I have no idea what the current password is, and can't see any of
> that stuff.
You are all cockroaches scurrying around in the dark, aren't you? Thank
goodness I don't have to live like that...
--
Look at that. The one, the only, the original, the stupid Naughty Boy is
back. Who said Usenet couldn't go further downhill?
|
|