North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical RE: Just Carnivore (was: Yahoogroups and Carnivore)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 You're assuming that you HADN'T established that pattern already.. I think an excellent delivery method would be to embed in porn, and post to a mailing list/yahoo group/what have you to which both people are subscribed... Granted the FBI could track it down, but if you're following your established pattern of sending porn, and knowing that your recipient is on the distribution list, that's more than likely a better way than any other form of person to person email.. Just my $0.02. Regards, Matt - -- Matt Levine @Home: [email protected] @Work: [email protected] ICQ : 17080004 PGP : http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x6C0D04CF - -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of [email protected] Sent: Tuesday, September 18, 2001 2:27 AM To: Roeland Meyer Cc: [email protected] Subject: Re: Just Carnivore (was: Yahoogroups and Carnivore) On Mon, 17 Sep 2001 22:36:53 PDT, Roeland Meyer said: > So, Bruce Schneier, when posing that problem, must have had his > imagination disengaged. There is more than adequate cover story for > passing huge JPGs around. No, he actually had his brain engaged. His point was that if you're trying to use steganography to move data around under the nose of a government that's actively trying to catch you at something, you can't just start sending files around, because that would set off traffic pattern analysis warnings. http://www.counterpane.com/crypto-gram-9810.html#steganography for the whole story. /Valdis -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQA/AwUBO6bsBMp0j1NsDQTPEQKL9ACg2izxDjvDBpDGoxvS6nSZSN5qJswAn19G ykX6kXCLKHvA617h0O5uK4wa =OASv -----END PGP SIGNATURE-----
|