From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
To: cypherpunks@toad.com
Message Hash: 33840b9b3d9e22c8c9a6a5ded0bed2580598ae6e6cd57fd6316c2b34ca3ccfe0
Message ID: <Mgrx8p600awIE6nVN_@andrew.cmu.edu>
Reply To: <9311090903.AA10563@jobe.shell.portal.com>
UTC Datetime: 1993-11-09 17:28:39 UTC
Raw Date: Tue, 9 Nov 93 09:28:39 PST
From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
Date: Tue, 9 Nov 93 09:28:39 PST
To: cypherpunks@toad.com
Subject: Re:
In-Reply-To: <9311090903.AA10563@jobe.shell.portal.com>
Message-ID: <Mgrx8p600awIE6nVN_@andrew.cmu.edu>
MIME-Version: 1.0
Content-Type: text/plain
An anonymous poster said:
> Of course, even if the modems had NSA-proof encryption built
> in, the victim could always intercept the decrypted data on the
> DTE connector... cracking is and will remain a risky and
> stupid thing to do...
Most likely the DTE will be doing the encryption/decryption. Who would
buy an expensive hardware encryption device when you can write terminal
software to do it?
Yeah, tapping 1200 and 2400 bps modems is prety easy to do. Actually
you probably wouldn't even need to build filters or anything, just
record the signal and connect it to a stock 2400 modem, then set the
modem to originate or answer. The modem already has filters to decode
the data, of course. You have to do it twice if you want to get both
sides of the transmission tho.
Return to November 1993
Return to “nobody@shell.portal.com”