CelBomb
John Young
jya at pipeline.com
Sat Jan 6 06:04:23 PST 1996
Can anyone in IL, or elsewhere, report more on the head-job
of The Engineer:
Any crypto used to authenticate the target for the boombox,
or to obscure links to the assassin?
How was the blast specifically targeted at him and not a
phone borrower?
How it was set off -- by user-dialing, remote control, some
other means?
Any fishy smelling brand names to immediately run from?
Answers urgent.
More information about the cypherpunks-legacy
mailing list