About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Computer Privacy Digest Vol 2 #017


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Computer Privacy Digest Wed, 17 Feb 93 Volume 2 : Issue: 017

Today's Topics: Moderator: Dennis G. Rears

Digitizing signatures for credit card purchases
Re: SSN as a red herring
Username, real names, and privacy
privacy in communication technologies
privacy

The Computer Privacy Digest is a forum for discussion on the
effect of technology on privacy. The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy
(Moderated). Submissions should be sent to
[email protected] and administrative requests to
[email protected].
Back issues are available via anonymous ftp on ftp.pica.army.mil
[129.139.160.133].
----------------------------------------------------------------------

Date: Thu, 11 Feb 93 16:33:24 -0800
From: "Glenn S. Tenney" <[email protected]>
Subject: Digitizing signatures for credit card purchases

If you thought that signing for a package onto a notebook computer was bad,
you ain't seen nothing yet...

My wife just told me that The Gap (a large clothing store chain) store near
to us has a new computerized system. When making a credit card purchase
with a Visa card, she had to "sign" on a digitizing tablet. Then, they
printed out her receipt just like a cash register receipt with our credit
card number on it, but no signature.

I called BankAmericard who bounced me around and then they bounced me to
the 1-800-VISA-911 line. I finally called the Visa International main
office which is nearby and their customer relations person told me: If I
didn't like that system, it was my choice to not buy from that merchant --
but the merchant can use any system they want. She said that there was no
need to give me a receipt with my signature on it, since I could request
one from my bank.

When I sign for packages, I just print my name. For this, I might do the
same if push came to shove, but I do *NOT* like the idea of some store
having my signature actually "on-file" digitally!

---
Glenn Tenney
[email protected] Amateur radio: AA6ER
Voice: (415) 574-3420 Fax: (415) 574-0546

------------------------------

Subject: Re: SSN as a red herring
From: Brian Pirie <[email protected]>
Date: Sun, 14 Feb 1993 07:38:41 -0500
Organization: BP ECOMM Systems, Ottawa, Ontario, Canada

[email protected] (Philip Hurley) writes:

> I have considered the ramifications of writing a virus program (I don't know
> how and never have) that will delete any reference it finds with my name in
> it.
>
> I figure, the worst that can happen is that my bank "forgets" who I am. I
> might be willing to deal with the hassle of correcting such an error face-to-
> face with my bank in exchange for knowing that other data bases will also "
> forget" who I am.

This would not work, and it would lead the authorities right to your
doorstep. First of all, the chances of such a virus infiltrating a
system such as your bank's computer is next to nil. Their security will
be good enough that they simply wouldn't allow a virus to get into the
system. Secondly, such a virus that operated on one hardware/software
platform would most likely not function on others. You would have to
write a different virus for every hardware/software platform that might
be used for maintaining some database that includes your name.

Also, even if it were possible to write such a virus, you would have the
FBI or CIA (or whatever is the relavent authority in your country)
knocking on your door, probably before your virus has had a chance to do
any damage. Regardless of how sophisticated an encryption scheme is
used by the virus program, if it is written specifically delete every
occurance of your name, it wouldn't take them long to find the Philip
Hurley who wrote the virus.

--
Brian Pirie, [email protected] (Ottawa, Ontario, Canada)
PGP 2 key available upon request

------------------------------

From: [email protected]
Subject: Username, real names, and privacy
Date: 16 Feb 93 19:09:03 -0400
Organization: Dalhousie University, Halifax, Nova Scotia, Canada

I'd like to get some comments on the following issue. We have a facility,
called "FIND", on our main academic computer system where users can
voluntarily put information about themselves, including their name. They are
informed about the existence and purpose of FIND (primarily promoting good
communication among users) the first time they login. No one is required to
have a FIND listing but most people do.
It has been the practice that if someone enquires about the name of the
owner of a username, and that username is not listed in FIND, we will not give
out the person's name in order to protect their privacy. After an incident
where we would not release the owner's name to a user who complained about an
e-mail message from a username not listed in FIND, it has been suggested that
we change our policy and provide a public username to real name correspondence
for all usernames.
In this case we were protecting the privacy of a person who had obviously
violated the university's "Responsible Computing" policy. If the complainer
had wanted (or rather, not asked that we refrain from doing so) we would have
got in touch with the offender and asked for a change in behaviour, but we
would not reveal the identity of that person.
The policy change is directed against people who abuse the anonymity we make
possible (users may have any username of two to eight letters and digits
within reasonable limits). Should it be a condition of getting a computer
username that the owner's real name be public? Of course it is well known
that e-mail can be forged so that the identity of the sender is not, at the
very least, immediately apparent. I'd be interested to know what formal
policies other universities have in this area (I hope for some Canadian
responses).

Aidan Evans ([email protected]), Computer Facilities & Operations,
University Computing & Information Services, Dalhousie University,
Halifax, N.S., Canada, B3H 4H8

------------------------------

From: Deborah Parker <[email protected]>
Subject: privacy in communication technologies
Date: Wed, 17 Feb 1993 04:04:20 GMT
Organization: University of Illinois

I am looking for information concerning privacy/security in communication
technologies, especially concerning caller identification, electronic
mail, and cellular communication. I am also interested in the regulation
of communication technologies under the Federal Communication Commission.
I am working on a project at the University of Illinois-Urbana/Champaign
and would appreciate any information available. Thanks! Deb Parker

------------------------------

From: Thomas Chen <[email protected]>
Subject: privacy
Organization: Hughes Network Systems Inc.
Date: Tue, 16 Feb 1993 20:23:17 GMT

well, with the advancement of technology in moderm society,
privacy is something we will have to give up eventually.
when we move to a society where there is no more money but
just a card, everything we do, everything we spend are logged
somewhere. but what is the big deal??? as of now, if you
have a mobile phone, the cellular company knows where you
are (within a cell), when you shop in department stores with
your credit cards, they compile your shopping habit profile,
when you subscribe a magazine, you are automatically
categorized into a group. what we are doing is exchange part
of our personal information for a lot of other people's information.


Tom

As the people here grow colder
I turn to my computer
and spend my evenings with it
like a friend
I was loading a new program
I had ordered from a magazine
"Are you lonely, are you lost?
This voice console is a must"
I press EXECUTE

Well, I've never felt such pleasure
Nothing else seemed to matter
I neglected my bodily needs
I did not eat, I did not sleep
The intensity increasing
'Til my family found me and intervened
But I was lonely, I was lost
Without my little black box
I pick up the phone and go EXECUTE

--- Kate Bush, "Deeper Understanding"




------------------------------

End of Computer Privacy Digest V2 #017
******************************
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS