http://www.esecurityplanet.com/prevention/article.php/3694711
I'd sure like technical details...
--Steve Bellovin, http://www.cs.columbia.edu/~smb
-
The Cryptography Mailing List
Unsubscribe by sending
That's a pretty in-credible report.
Emphasis on in-.
It's disturbing to see Security Researchers so willing to trade on
rumors in order to be quoted in the press.
The conclusion is pretty confusing.
Conclusion
Internet-based attacks are extremely popular with terrorist
organizations
On 20 August 2007 16:00, Steven M. Bellovin wrote:
http://www.esecurityplanet.com/prevention/article.php/3694711
I'd sure like technical details...
Well, how about 'it can't possibly work [well]'?
[ ... ] The article provides a detailed example of how 20 messages can be
hidden in a 100
Dave Korn wrote:
That's gotta stand out like a statistical sore thumb.
The article is pretty poor if you ask me. It outlines three techniques for
stealth: steganography, using a shared email account as a dead-letter box, and
blocking or redirecting known IP addresses from a mail