On Fri, 11 Oct 2002, Tyler Durden wrote:
And indeed, in a world where most messages are fairly weakly encrypted,
bursts of strongly-encrypted messages will stand out all the more and
possibly flag the need for other methods of investigation.
Doesn't figure: while it's easy to screen for
willing to concede that at his point I'm talking completely out of my
arse. (That will change when I get time to do some real homework in this
area, however.)
From: Eugen Leitl [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Echelon-like
On Sun, 13 Oct 2002, Tyler Durden wrote:
And of course you can package 'strong' encryption into a 'weak' encryption
envelope, so you will only know that 'strong' encryption has been used after
you've broken the 'weak' envelope.
Oh yeah. Interesting. Of course, this would be done only if
packaging strong crypto inside weak crypto
At 01:06 PM 10/13/2002 -0400, Tyler Durden wrote:
Oh yeah. Interesting. Of course, this would be done only.
if the sender knew or supected how mass-scanning might be done.
And so the existence of another level of heavier encryption ...
might be a tip off
At 10:52 AM -0700 on 10/13/02, Bill Stewart wrote:
(You may not remember, but there was a program from fortify.net
that fixed 40-bit implementations of Netscape,
and there was even a one-liner Javascript signature-line program
that let you set Netscape to use 128 bits...
Not to mention the
On Fri, Oct 11, 2002 at 10:29:53AM -0400, Tyler Durden wrote:
Harmon Seaver wrote...
Why the hell would anyone use lotus notes encryption for anything
whatsoever?
Lotus Notes or whatever, of course. The point here is that larger
Or whatever? What makes you think that anyone can
Harmon Seaver wrote...
Why the hell would anyone use lotus notes encryption for anything
whatsoever?
Lotus Notes or whatever, of course. The point here is that larger
organizations with decryption capabilities probably do not think on the
message-by-message level very often, just like
]
Subject: Re: Echelon-like resources...
Date: Fri, 11 Oct 2002 09:39:01 -0500
On Fri, Oct 11, 2002 at 10:29:53AM -0400, Tyler Durden wrote:
Harmon Seaver wrote...
Why the hell would anyone use lotus notes encryption for anything
whatsoever?
Lotus Notes or whatever, of course. The point
Why the hell would anyone use lotus notes encryption for anything whatsoever?
On Fri, Oct 11, 2002 at 09:37:52AM -0400, Tyler Durden wrote:
OK, let's assume for the same of argument that it takes about 1 minute for
Echelon/NSA-like resources to break a weakly encypted lotus notes message.
OK, let's assume for the same of argument that it takes about 1 minute for
Echelon/NSA-like resources to break a weakly encypted lotus notes message.
And then let's assume that there's a whole LOT of these machines sitting
somewhere.
And as the grumpy Tim May has suggested, perhaps only a
At 10:54 AM 10/11/2002 -0400, Tyler Durden wrote:
Which returns to my original point: the easy availability of strong
crypto products does not mean it is unprofitable for an agency to continue
to push populations towards lighter forms of encryption.
Assuming that the agency's goal is to
11 matches
Mail list logo