1995-01-18 - Re: Known data havens for pirates? Doubtful

Header Data

From: Robert Rothenberg <rrothenb@libws4.ic.sunysb.edu>
To: tcmay@netcom.com (Timothy C. May)
Message Hash: 83af420d1522f91a937580160797d3d7e53af373419d64463842aada9d904e6f
Message ID: <9501181127.AA24624@toad.com>
Reply To: <199501180700.XAA14684@netcom2.netcom.com>
UTC Datetime: 1995-01-18 11:27:49 UTC
Raw Date: Wed, 18 Jan 95 03:27:49 PST

Raw message

From: Robert Rothenberg <rrothenb@libws4.ic.sunysb.edu>
Date: Wed, 18 Jan 95 03:27:49 PST
To: tcmay@netcom.com (Timothy C. May)
Subject: Re: Known data havens for pirates? Doubtful
In-Reply-To: <199501180700.XAA14684@netcom2.netcom.com>
Message-ID: <9501181127.AA24624@toad.com>
MIME-Version: 1.0
Content-Type: text


> 
> The comments about data havens have been interesting to read. Being

[ .. ]

> Yes, this is the way to go. The data havens have a location that is a
> public key in cyberspace. Think of it as one entity placing an
> anonymous, untraceable classified ad in a newspaper, readable by many,
> and others placing ads in response. A two-way communication channel is
> thus opened up, without regard for the physical location of each, the
> nature of the communication, the data to be transferred, etc.
> 
> All of that is just detail.

Hmmm... then why use a data haven at all?  Split the file into small
pieces, encrypt each and post each piece in a newsgroups (the pieces may
even be posted as small garbles of data in sigs?).  When you need to 
recover the file checksites which archive those newsgroups.

Just a thought. It's probably quite doable for small files.

Another idea: use encryption/secret sharing combined with steganography
and upload copies of the said files to various ftp-sties or BBS's. (It
may be that this is more secure than data havens, since few SysAdmins
would bother checking for steganographically hidden files...)

> 
> --Tim May

Rob





Thread