On 9/23/13 10:11 AM, Leif Johansson wrote:
On 09/23/2013 03:17 PM, Scott Brim wrote:
On Sep 23, 2013 2:30 AM, "Leif Johansson" <[email protected]
<mailto:[email protected]>> wrote:
> Instead of tilting at that windmill, would it be possible to build a
> mechanism for making detection of 3rd party intercept tools and
> other malware in software easy?
Nice idea. Back when I tried, my experience was that it's very hard to
distinguish good intercepts from bad ones. Would you get away from all
middleboxes?
Scott
I might not be able to get away from them but I would like to know they
exist.
That's interesting if some of your messages are intercepted and others
are not. But once you see that 100% of your messages are intercepted by
Big Brother, then it isn't very helpful.
My guess is that endpoint intercept malware will slip through the hands
of govt owners and into the hands of regular criminals at which point I
*really* do want the reporter to be able to know if the local maffioso is
running intercepts on her laptop to find out what she is going to be writing
about next...
Do you expect that it will be easy to tell who is operating the
intercept? Of that the local maffioso doesn't get his data from a ring
that intercepts Big Brother's intercept?
Thanks,
Paul
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass