How to defeat spyware

Tim May tcmay at got.net
Mon Jan 7 22:49:54 PST 2002


On Monday, January 7, 2002, at 05:34 PM, keyser-soze at hushmail.com wrote:

> At 04:46 PM 1/7/2002 -0800, Tim May wrote:
> On Monday, January 7, 2002, at 04:11 PM, Steve Schear wrote:
>
>>> How to defeat spyware
>>> There's no way of knowing how many people are using them, but it must 
>>> be a bunch. Companies use them, the government uses them, and 
>>> suspicious spouses use them. I'm talking about keystroke 
>>> loggers--both software and hardware.
> http://www.zdnet.com/zdnn/stories/comment/0,5859,2836055,00.html
>
>> Setting a trap gun to blow away anyone who inserts a floppy (or hooks 
>> up a cable) to a machine he has not been given access to is morally 
>> permissable.
>
> But legally a no-no.  Its an indescriminate weapon.  Better to hook up 
> the arsonal to an biometric authentication system which can be enabled 
> when you're away.  That way if there's a mess to clean up upon arrival 
> you can tell the judge that the weapon wasn't indescriminate.
>

Or use the webcams to watch remotely who is trespassing in one's 
house....then start the gasoline leaking, wait about 20 seconds, then 
trigger the ignitors.

The scene would be delicious...too bad the smell cannot be transmitted.

"I love the smell of burning bacon...it smells like...victory."




--Tim May, Corralitos, California
Quote of the Month: "It is said that there are no atheists in foxholes; 
perhaps there are no true libertarians in times of terrorist attacks." 
--Cathy Young, "Reason Magazine," both enemies of liberty.





More information about the cypherpunks-legacy mailing list