Security Incidents mailing list archives
Re: blind forwards
From: visigoth () TELEMERE NET (Visigoth)
Date: Fri, 30 Jun 2000 19:22:23 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
looking at the message as received by the intended user. After all, if it *could* be reliably done, people wouldn't be nearly so worried about government taps! The only methods I can think of would all involve getting taps inserted around each relay machine and doing some traffic analysis. But even then you'd need to make sure you'd intercepted *all* traffic from the suspected machine. Possibly including the locally connected printer...
As scairy and far out as this sounds, the House of Lords in England just submitted a law that would do just that.. ;) (a little off topic but scairy...) http://www.securityfocus.com/templates/article.html?id=52 Visigoth Damieon Stark Sr. Unix Systems Administrator visigoth () telemere net PGP Public Key: www.telemere.net/~visigoth/visigoth.asc ____________________________________________________________________________ | M$ -Where do you want to go today? | Linux -Where do you want to go tomorrow?| FreeBSD - The POWER to serve Freebsd -Are you guys comming or what? | http://www.freebsd.org | | - ---------------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQA/AwUBOV0rsznmC/+RTnGeEQK54wCcDM1/M2zFq++H22p5YhcM33ChFj0AnjR0 drQcdoCjGVG8qTZIxBTcazjG =2xGP -----END PGP SIGNATURE-----
Current thread:
- Re: blind forwards Visigoth (Jun 30)
- Re: blind forwards WebFusion System Administrator (Jul 03)