Interesting People mailing list archives

IP: Re: dejavu -- Hijackers' e-mails were unencrypted


From: David Farber <dave () farber net>
Date: Thu, 04 Oct 2001 21:16:57 -0400


From: "Stewart, William C (Bill), BMSLS" <billstewart () att com>
To: farber () cis upenn edu
Subject: RE: Re: dejavu -- Hijackers' e-mails were unencrypted
Date: Thu, 4 Oct 2001 20:09:40 -0500
X-Mailer: Internet Mail Service (5.5.2653.19)

>From: Mary Shaw <mary.shaw () cs cmu edu>
>To: farber () cis upenn edu
>
> > Ed Gerck <egerck () nma com> suggests
> > >I suggest this would be a much more efficient way to reduce the
> > >misuse of our communication networks. For example, if one email
> > >address under surveillance receives email from X, Y and Z, then
> > >X, Y and Z will also be added to the surveillance. Even if
> > >everything is encrypted, people and computers can be verified.
> > >
>
>In other words, let's legitimize guilt by association?  How long will it
>take for the transitive closure thus computed to include everyone on the
>internet?

Depends on whether the FBI counts mail from spammers in their tracking :-)

Of course, the Spam Mimic program which constructs bogus spam text
for steganographically carrying real messages means they may need to.
An example implementation is at www.spammimic.com , though I can't
send the output because it would peg everybody's spam-detection meters.
The credits page http://www.spammimic.com/credits.shtml
refers to Peter Wayner's work on Mimic Functions, for encoding
arbitrary text using arbitrary context-free grammars,
which are the theoretical basis for the site.



For archives see: http://www.interesting-people.org/


Current thread: