Just Carnivore (was: Yahoogroups and Carnivore)

Matt Levine matt at deliver3.com
Tue Sep 18 06:42:44 UTC 2001


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

You're assuming that you HADN'T established that pattern already..  I
think an excellent delivery method would be to embed in porn, and
post to a mailing list/yahoo group/what have you to which both people
are subscribed...  Granted the FBI could track it down, but if you're
following your established pattern of sending porn, and knowing that
your recipient is on the distribution list, that's more than likely a
better way than any other form of person to person email..


Just my $0.02.

Regards,
Matt

- --
Matt Levine
@Home: matt at deliver3.com
@Work: matt at easynews.com
ICQ  : 17080004
PGP  : http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x6C0D04CF 

- -----Original Message-----
From: owner-nanog at merit.edu [mailto:owner-nanog at merit.edu] On Behalf
Of Valdis.Kletnieks at vt.edu
Sent: Tuesday, September 18, 2001 2:27 AM
To: Roeland Meyer
Cc: nanog at merit.edu
Subject: Re: Just Carnivore (was: Yahoogroups and Carnivore) 



On Mon, 17 Sep 2001 22:36:53 PDT, Roeland Meyer said:
> So, Bruce Schneier, when posing that problem, must have had his 
> imagination disengaged. There is more than adequate cover story for
>  passing huge JPGs around.

No, he actually had his brain engaged.  His point was that if you're
trying to use steganography to move data around under the nose of a
government that's actively trying to catch you at something, you
can't just start sending files around, because that would set off
traffic pattern analysis warnings.

http://www.counterpane.com/crypto-gram-9810.html#steganography  for
the whole story.

/Valdis

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBO6bsBMp0j1NsDQTPEQKL9ACg2izxDjvDBpDGoxvS6nSZSN5qJswAn19G
ykX6kXCLKHvA617h0O5uK4wa
=OASv
-----END PGP SIGNATURE-----




More information about the NANOG mailing list