Interesting People mailing list archives
IP: Re: dejavu -- Hijackers' e-mails were unencrypted
From: David Farber <dave () farber net>
Date: Thu, 04 Oct 2001 21:16:57 -0400
From: "Stewart, William C (Bill), BMSLS" <billstewart () att com> To: farber () cis upenn edu Subject: RE: Re: dejavu -- Hijackers' e-mails were unencrypted Date: Thu, 4 Oct 2001 20:09:40 -0500 X-Mailer: Internet Mail Service (5.5.2653.19) >From: Mary Shaw <mary.shaw () cs cmu edu> >To: farber () cis upenn edu > > > Ed Gerck <egerck () nma com> suggests > > >I suggest this would be a much more efficient way to reduce the > > >misuse of our communication networks. For example, if one email > > >address under surveillance receives email from X, Y and Z, then > > >X, Y and Z will also be added to the surveillance. Even if > > >everything is encrypted, people and computers can be verified. > > > > >In other words, let's legitimize guilt by association? How long will it >take for the transitive closure thus computed to include everyone on the >internet? Depends on whether the FBI counts mail from spammers in their tracking :-) Of course, the Spam Mimic program which constructs bogus spam text for steganographically carrying real messages means they may need to. An example implementation is at www.spammimic.com , though I can't send the output because it would peg everybody's spam-detection meters. The credits page http://www.spammimic.com/credits.shtml refers to Peter Wayner's work on Mimic Functions, for encoding arbitrary text using arbitrary context-free grammars, which are the theoretical basis for the site.
For archives see: http://www.interesting-people.org/
Current thread:
- IP: Re: dejavu -- Hijackers' e-mails were unencrypted David Farber (Oct 04)
- <Possible follow-ups>
- IP: Re: dejavu -- Hijackers' e-mails were unencrypted David Farber (Oct 04)