From: doug@netcom.com (Doug Merritt)
To: cypherpunks@toad.com
Message Hash: bc3daa14ec917a645066a596c1b30cae201eb1a309288a550d8eabc595ef5be5
Message ID: <9310140244.AA04580@netcom2.netcom.com>
Reply To: <mg5n+@andrew.cmu.edu>
UTC Datetime: 1993-10-14 02:46:47 UTC
Raw Date: Wed, 13 Oct 93 19:46:47 PDT
From: doug@netcom.com (Doug Merritt)
Date: Wed, 13 Oct 93 19:46:47 PDT
To: cypherpunks@toad.com
Subject: Re: Spread-spectrum net (vulnerability of)
In-Reply-To: <mg5n+@andrew.cmu.edu>
Message-ID: <9310140244.AA04580@netcom2.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
Matthew J Ghio <mg5n+@andrew.cmu.edu> said:
>Switching frequencies rapidly to prevent triangulation is still the best
>defense.
Think from the point of view of the spotters. They can look at a
broad-spectrum scan, gradually eliminate known sources, and end up
homing in on the remaining high power signals.
Doug
Return to October 1993
Return to “Matthew J Ghio <mg5n+@andrew.cmu.edu>”