North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Just Carnivore (was: Yahoogroups and Carnivore)

  • From: Matt Levine
  • Date: Tue Sep 18 02:45:16 2001

 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

You're assuming that you HADN'T established that pattern already..  I
think an excellent delivery method would be to embed in porn, and
post to a mailing list/yahoo group/what have you to which both people
are subscribed...  Granted the FBI could track it down, but if you're
following your established pattern of sending porn, and knowing that
your recipient is on the distribution list, that's more than likely a
better way than any other form of person to person email..


Just my $0.02.

Regards,
Matt

- --
Matt Levine
@Home: [email protected]
@Work: [email protected]
ICQ  : 17080004
PGP  : http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x6C0D04CF 

- -----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf
Of [email protected]
Sent: Tuesday, September 18, 2001 2:27 AM
To: Roeland Meyer
Cc: [email protected]
Subject: Re: Just Carnivore (was: Yahoogroups and Carnivore) 



On Mon, 17 Sep 2001 22:36:53 PDT, Roeland Meyer said:
> So, Bruce Schneier, when posing that problem, must have had his 
> imagination disengaged. There is more than adequate cover story for
>  passing huge JPGs around.

No, he actually had his brain engaged.  His point was that if you're
trying to use steganography to move data around under the nose of a
government that's actively trying to catch you at something, you
can't just start sending files around, because that would set off
traffic pattern analysis warnings.

http://www.counterpane.com/crypto-gram-9810.html#steganography  for
the whole story.

/Valdis

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBO6bsBMp0j1NsDQTPEQKL9ACg2izxDjvDBpDGoxvS6nSZSN5qJswAn19G
ykX6kXCLKHvA617h0O5uK4wa
=OASv
-----END PGP SIGNATURE-----