On Thu, Jun 27, 2013 at 2:42 PM, Kurt Buff <[email protected]> wrote:
> If you're monitoring your environment properly, there is no anonymity.
> Event logs, SMTP logs, IIS logs, NTFS permissions and all the rest
> should make everything thing someone does over the network inside your
> company very traceable.

  I bet you could design an in-house system that did it pretty well,
though.  Build a dedicated and stand-alone (non-domain) web server,
turn off most/all logging on it, script something to batch together
submission results and then randomize their order before forwarding
them via SMTP to your main system.

  (I would expect this to be overkill, but as a thought experiment
it's interesting.)

-- Ben


Reply via email to