Problem: how much trust do you have for a temporary site set up to give Internet access? Can you assure yourself they're not capturing your telnets and remote logins?
At a recent SF con I attended, there was a rumor going around to the effect that the admin was doing just this. I found the idea disturbing but eminently plausible.
--Alan Wexelblat, Reality Hacker, Author, and Cyberspace Bard
We believe this happened recently at the Hackers Conference (surprise!), when Internet access was provided on a machine that was later found to have been cracked by someone. --Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. Note: I put time and money into writing this posting. I hope you enjoy it.