bear wrote:

> On Wed, 27 Aug 2003, Ed Gerck wrote:
> >OTOH, it is possible that the dutch man was traced not by a one
> >time download of the image but by many attempts to find it,
> >since the upload time of the image to the site was not exactly
> >known to him and time was of essence. In this case, the required
> >tracing capability would NOT need a large capability for packet
> >recording and correlation. It would just include finding 100's
> >(or 1000's) of identical access occurrences in surfola's incoming
> >server traffic, after surfola's server was tagged from the website's
> >logs.
> The problem being here access to the website's logs. Getting the logs
> via a warrant and due process,

No, the website's logs mentioned above belongs to the victim -- who had no
problems in fully cooperating with law enforcement.

> which seems like a minimal exercise for
> a privacy server, is hard to do inside 24 hours.  It's much easier to
> believe that the FBI is keeping its own logs at hubs, routers, and
> switches connected to surfola, thereby eliminating the need for
> warrant service.

surfola connects upstream to someone, who is tapped before the
victim posts the image.

Ed Gerck

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to