Time: Fri Jun 13 07:09:18 1997
by primenet.com (8.8.5/8.8.5) with SMTP id VAA02084
for [address in tool bar]; Thu, 12 Jun 1997 21:21:15 -0700 (MST)
Delivered-To: liberty-and-justice-outgoing@majordomo.pobox.com
Date: Thu, 12 Jun 1997 21:16:18 -0700
To: liberty-and-justice@pobox.com
From: Paul Andrew Mitchell [address in tool bar]
Subject: L&J: W A R N I N G: NETSCAPE SPY "BUG"
It's no accident. The type of behavior you
are describing would take 500 to 1000 lines
of high-level language code, to do properly.
So, there is no way this is a "bug." A bug
is a logical error which causes a program
to malfunction. What you are describing here
is not a "bug", and I don't mean that this
as a mere semantic distinction.
/s/ Paul Mitchell
At 08:46 PM 6/12/97 -0700, you wrote:
> (Post.Office MTA v3.1 release PO203a ID# 0-36386U2500L250S0)
> with ESMTP id AAA240 for <ewolfe@involved.com>;
> Thu, 12 Jun 1997 20:26:14 -0700
WAA24092 for okcbomb-mail; Thu, 12 Jun 1997 22:23:01 -0500 (CDT)
mars.galstar.com (8.8.5/8.8.5) with ESMTP id WAA24084 for
<okcbomb@mars.galstar.com>; Thu, 12 Jun 1997 22:22:57 -0500 (CDT)
> by smtp2.erols.com (8.8.5/8.8.5) with SMTP id XAA07786;
> Thu, 12 Jun 1997 23:22:08 -0400 (EDT)
>Date: Thu, 12 Jun 1997 23:22:08 -0400 (EDT)
>To: liberty-and-justice@pobox.com
>From: Ian Goddard <igoddard@erols.com>
>Subject: okcbomb] W A R N I N G: NETSCAPE SPY "BUG"
>
>SPREAD THIS FAR & WIDE
>
>CNN just ran a special report revealing the existence of
>a so called "bug" in NETSCAPE that allows a host's system
>from which you download a webpage to access any file on your
>computer. CNN proved that this bug does exist. As CNN states:
>
> The bug makes it possible for Web-site
> operators to read anything stored on the
> hard drive of a PC logged on to the Web site.
>
>The host site must know what files to look for. Interesting
>that, in the course of my TWA 800 research, while accessing
>some U.S. military webpages that once existed but now would
>no longer come in, the small icons on the lower right hand
>side of my screen would indicate that quite a lot of data
>was being uploaded to the host server. The lights would go
>from the icon representing my computer to the host computer
>for almost a minute, the opposite of the normal download
>light sequencing. My hard drive would also be activated
>during this time. Gee whiz... ?? Such as this military
>URL on CEC: http://130.163.113.252/cec_eng.htm Probably
>there's another explanation for the reverse sequence,
>but in light of this report, it's worth pondering.
>
>I find it rather strange that there would be a "bug" that
>just happens to perform such an underhanded function. Is not
>a "bug" defined as something that prevents, not facilitates,
>a function? Something that would allow me to target and
>acquire a file on a remote computer would seem to be a
>function. It would therefore seem that this function cannot
>be defined as a "bug." If the host can target a given file,
>this is not a bug but a secret program in the program.
>
>I further suspect that the host could enter a command to
>find all files that are for example twa*.* and thus all
>files with "twa" at the beginning would be lifted off
>one's system. I wonder what other convenient "bugs"
>might lurk inside the rat-fink NETSCAPE program.
>
>I wonder if this is not grounds for a class-action law
>suit, if it could be proven that the "bug" is no accident.
>That it just happens to be in all versions of Netscape
>including their latest version released yesterday is a
>little hard to dismiss as error. I'm sure any qualified
>programmer could determine if it is by error or design.
>It could be a means by which to steal the source codes
>of programers that they develop, where the thief has
>a clue about possible file names for those codes.
>
>NETSCAPE BUG: http://cnnfn.com/digitaljam/9706/12/netscape_pkg/
>
>
>***********************************************************************
> IAN GODDARD (igoddard@erols.com) Q U E S T I O N A U T H O R I T Y
>-----------------------------------------------------------------------
> VISIT Ian Williams Goddard ------> http://www.erols.com/igoddard
>_______________________________________________________________________
>
> TWA 800: THE FACTS --> http://www.erols.com/igoddard/twa-fact.htm
>
> OKC BOMBING ---> http://www.erols.com/igoddard/prior.htm
>
>---
>For list service help, send a message to okcbomb-request@mars.galstar.com
with a subject of HELP.
>
>
========================================================================
Paul Andrew Mitchell : Counselor at Law, federal witness
B.A., Political Science, UCLA; M.S., Public Administration, U.C. Irvine
tel: (520) 320-1514: machine; fax: (520) 320-1256: 24-hour/day-night
email: [address in tool bar] : using Eudora Pro 3.0.2 on 586 CPU
website: http://www.supremelaw.com : visit the Supreme Law Library now
ship to: c/o 2509 N. Campbell, #1776 : this is free speech, at its best
Tucson, Arizona state : state zone, not the federal zone
Postal Zone 85719/tdc : USPS delays first class w/o this
As agents of the Most High, we came here to establish justice. We shall
not leave, until our mission is accomplished and justice reigns eternal.
========================================================================
[This text formatted on-screen in Courier 11, non-proportional spacing.]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Unsub info - send e-mail to majordomo@majordomo.pobox.com, with
"unsubscribe liberty-and-justice" in the body (not the subject)
Liberty-and-Justice list-owner is Mike Goldman <whig@pobox.com>
Return to Table of Contents for
Supreme Law School: E-mail