-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Martin Mačok wrote: | Anyway, she is (at least) able to spoof any IP address for which she | is able to see the replies - i.e. almost any other IP address on her | local network or "behind" it (say, she controls the router).
This is a very important distinction, one that seems to be frequently overlooked.
I wonder if it'll ever be brought up in a courtroom? How can one demonstrate a certain packet came from a certain computer, when any number of faceless upstream deviants could conceivably have been responsible for it?
Cael -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (MingW32)
iD8DBQFAbB81R2vQ2HfQHfsRAnkNAJwLdSlnh0KOfoEvcaBLmW+S+azcYwCeJuZR kccu8acu0CBAnzLyO84j684= =EDwH -----END PGP SIGNATURE-----
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
