And of course, all the addresses used and texts sent via the card service since April 2006 were logged in cleartext, and have already attracted some considerable attention. ❋ Unknown (2006)
From A I can ping the tun device on B, and from B I can ping the tun device on A. That ping will actually travel over the socket connection, i.e. the ping packet will be encapsulated within a UDP or TCP packet and sent between A and B. The problem with this very simple VPN is it's missing the security - it is what is known as a cleartext tunnel. ❋ Unknown (2008)
If you don't use a secure connection, then your login and password are sent over the internet in a 'cleartext' form which can be easily intercepted. ❋ Abhay N (2007)
You are transmitting a message in cleartext, via a binary medium 1/0s, long/shorts, that is handled and re-transmitted by a number of 3rd parties beyond the senders control. ❋ Unknown (2009)
My friend Pablos is an amazing hacker/inventor -- part of the Shmoo Group, responsible for the WiFi hackerbot that seeks out people whose laptops are leaking cleartext passwords and rolls up to their feet, displaying their passwords on a upfacing LCD, and numerous other projects. ❋ Unknown (2005)
A little bird told me that the XML info associated with the running is just sitting on the iPod in cleartext. ❋ Unknown (2006)
Scanning network traffic on a busy day one sees many cleartext email passwords, virus propagation, and inappropriately shared directories not to mention a really dull selection of web sites. ❋ Unknown (2005)
And if they don't, you shouldn't be doing business with them in the first place: sending sensitive information in cleartext over the Internet is insecure regardless of your connection. ❋ Unknown (2003)
Any unencrypted wireless connection is subject to sniffing -- it should not come as a revelation to anyone in this day and age that cleartext wireless comms are being listened in on. ❋ Unknown (2002)
Eric Flint, a Baen Books author, has written an essay on his experiences with Baen's free etext program, where readers are given free cleartext copies of current titles to download. ❋ Unknown (2002)
First off, he fails to acknowledge the intractatability of making DRM work -- providing an untrusted party with the key, the ciphertext and the cleartext but asking that party not to make a copy of your message is just silly, and can't possibly work in a world of Turing-complete computing. ❋ Unknown (2002)
Consequently, all ISPs should be required to filter out all crypto (including ssl for shopping baskets, presumably -- what's a cleartext credit-card number of two when you're defending the world from terrorists, who presumably enciphered their box-cutters to slip them past airport security?). ❋ Unknown (2001)
I have to admit I didn't read all the comments for your post Anil, but bravo to you for putting your feelings in cleartext, and rather eloquent clear text at that. ❋ Unknown (2002)
Needless to say, encryption doesn't do much good if the cleartext is available this way. ❋ Unknown (1995)
The actual message received looked like random garbage, but the encryption machine changed that into cleartext Russian which a Marine translated: ❋ Clancy, Tom, 1947- (1991)
* Never send your password in cleartext across the Internet by using something like telnet or FTP. ❋ John Goerzen (N/A)
About 76% of the apps tested stored cleartext usernames on the devices ❋ Unknown (2011)