Ahh...The old trick of hiding in plain sight.

How many people are going to sit there and read e-mail about your aunt
Martha's kidney stones?

Yet, technology can aid the attacker.  If I were a hacker, I would most
likely use a program to do a word search for such things as "User",
"Password", "Visa Number", "Account#", "SSN"...etc., copy those messages and
flag for follow up.

That's why security is an issue for everyone, not just the companies that
violate the basic rules and leave it all hanging out!  Unfortunately, the
current laws favor those that like to leave it flappin in the breeze.


Douglas Gullett, CCNA, CCDA, CCNP


-----Original Message-----
From: Kevin Crichton [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 26, 2002 3:27 AM
To: veins
Cc: Dave Bujaucius; [EMAIL PROTECTED]
Subject: Re: Unencrypted Email


I know people may be worried about sending unencrypted email over the
internet, but some critics point out that if you send out encrypted
email it is more likely to come to the attention of those parties
interested in users using encryption since they would reason that people
using encryption have something to hide, even when all they want is privacy.

Yours,

Kevin Crichton PhD (St. Andrews), MCSE
ICL, Lytham

veins wrote:

>
> It is common knowledge that unencrypted messages sent over an unsecured
> Internet connection *can* be viewed in clear text and thus the contents
> compromised.  My questions:
>
> 1.  Is it really easy?  How readily available are sniffing tools that
> can do this?
>
> Any common sniffing tool can allow to do that, sometimes with minor
> alteration.
>
> 2.  Can it be done from a user's home dial up or DSL type connection?
> Can someone in California somehow be scanning mail leaving a New York
> location?
>
> basically, someone would need to compromise one of the mail servers
between
> the sender and the recipient, so yes it is possible, but no it's not
> possible for
> everyone.
>
> 3.  Outside of government agencies that have access to selected ISP's,
> how likely is it that a company could be targeted by an outside person
> or organization?
>
> it still depends on wether or not a mail server is compromised somewhere.
>
> veins
>
>

Reply via email to