1993-10-14 - Re: Spread-spectrum net (vulnerability of)

Header Data

From: doug@netcom.com (Doug Merritt)
To: cypherpunks@toad.com
Message Hash: bc3daa14ec917a645066a596c1b30cae201eb1a309288a550d8eabc595ef5be5
Message ID: <9310140244.AA04580@netcom2.netcom.com>
Reply To: <mg5n+@andrew.cmu.edu>
UTC Datetime: 1993-10-14 02:46:47 UTC
Raw Date: Wed, 13 Oct 93 19:46:47 PDT

Raw message

From: doug@netcom.com (Doug Merritt)
Date: Wed, 13 Oct 93 19:46:47 PDT
To: cypherpunks@toad.com
Subject: Re: Spread-spectrum net (vulnerability of)
In-Reply-To: <mg5n+@andrew.cmu.edu>
Message-ID: <9310140244.AA04580@netcom2.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Matthew J Ghio <mg5n+@andrew.cmu.edu> said:
>Switching frequencies rapidly to prevent triangulation is still the best
>defense.

Think from the point of view of the spotters. They can look at a
broad-spectrum scan, gradually eliminate known sources, and end up
homing in on the remaining high power signals.
	Doug





Thread