Security Incidents mailing list archives

Re: blind forwards


From: visigoth () TELEMERE NET (Visigoth)
Date: Fri, 30 Jun 2000 19:22:23 -0500


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

looking at the message as received by the intended user.
After all, if it *could* be reliably done, people wouldn't
be nearly so worried about government taps! The only methods
I can think of would all involve getting taps inserted around
each relay machine and doing some traffic analysis. But even
then you'd need to make sure you'd intercepted *all* traffic
from the suspected machine. Possibly including the locally
connected printer...

        As scairy and far out as this sounds, the House of Lords in
England just submitted a law that would do just that.. ;)

(a little off topic but scairy...)

http://www.securityfocus.com/templates/article.html?id=52

Visigoth

Damieon Stark
Sr. Unix Systems Administrator
visigoth () telemere net

PGP Public Key: www.telemere.net/~visigoth/visigoth.asc

____________________________________________________________________________
                                        |
M$ -Where do you want to go today?      |
Linux -Where do you want to go tomorrow?|   FreeBSD - The POWER to serve
Freebsd -Are you guys comming or what?  |   http://www.freebsd.org
                                        |
                                        |
- ----------------------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQA/AwUBOV0rsznmC/+RTnGeEQK54wCcDM1/M2zFq++H22p5YhcM33ChFj0AnjR0
drQcdoCjGVG8qTZIxBTcazjG
=2xGP
-----END PGP SIGNATURE-----


Current thread: