--- Anonymous [EMAIL PROTECTED] wrote:
And then, of course, in the off chance they can't actually break the
message under that flag, they can merely send a guy out with
binoculars or whatever.
Don't forget about rubber-hose cryptanlysis. Rumour has it that
method is preferred in
At 17:43 2005-04-29, you wrote:
Eh...for email you may have a point, but I'm not 100% convinced. In other
words, say they want to monitor your email account. Do you really believe
they are going to tap all major nodes and then filter all the traffic just
to get your email? ...
Well, they could
Eh...for email you may have a point, but I'm not 100% convinced. In other
words, say they want to monitor your email account. Do you really believe
they are going to tap all major nodes and then filter all the traffic just
to get your email? This is that whole, The TLAs are infinitely powerful
On Fri, 2005-04-29 at 11:43 -0400, Tyler Durden wrote:
Look...a little tiny yap yap dog can often scare off a bigger dog or
animal
by making it clear that any interaction's going to suck.
For some reason I'm reminded of the old tagline:
YIP! YIP! YAP! YIP! YAP! *BANG* [EMAIL PROTECTED] NO