-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 You're assuming that you HADN'T established that pattern already.. I think an excellent delivery method would be to embed in porn, and post to a mailing list/yahoo group/what have you to which both people are subscribed... Granted the FBI could track it down, but if you're following your established pattern of sending porn, and knowing that your recipient is on the distribution list, that's more than likely a better way than any other form of person to person email.. Just my $0.02. Regards, Matt - -- Matt Levine @Home: matt@deliver3.com @Work: matt@easynews.com ICQ : 17080004 PGP : http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x6C0D04CF - -----Original Message----- From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of Valdis.Kletnieks@vt.edu Sent: Tuesday, September 18, 2001 2:27 AM To: Roeland Meyer Cc: nanog@merit.edu Subject: Re: Just Carnivore (was: Yahoogroups and Carnivore) On Mon, 17 Sep 2001 22:36:53 PDT, Roeland Meyer said:
So, Bruce Schneier, when posing that problem, must have had his imagination disengaged. There is more than adequate cover story for passing huge JPGs around.
No, he actually had his brain engaged. His point was that if you're trying to use steganography to move data around under the nose of a government that's actively trying to catch you at something, you can't just start sending files around, because that would set off traffic pattern analysis warnings. http://www.counterpane.com/crypto-gram-9810.html#steganography for the whole story. /Valdis -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQA/AwUBO6bsBMp0j1NsDQTPEQKL9ACg2izxDjvDBpDGoxvS6nSZSN5qJswAn19G ykX6kXCLKHvA617h0O5uK4wa =OASv -----END PGP SIGNATURE-----