From: Matthew J Ghio <firstname.lastname@example.org>
Message Hash: 33840b9b3d9e22c8c9a6a5ded0bed2580598ae6e6cd57fd6316c2b34ca3ccfe0
Message ID: <Mgrx8p600awIE6nVN_@andrew.cmu.edu>
Reply To: <9311090903.AA10563@jobe.shell.portal.com>
UTC Datetime: 1993-11-09 17:28:39 UTC
Raw Date: Tue, 9 Nov 93 09:28:39 PST
From: Matthew J Ghio <email@example.com> Date: Tue, 9 Nov 93 09:28:39 PST To: firstname.lastname@example.org Subject: Re: In-Reply-To: <9311090903.AA10563@jobe.shell.portal.com> Message-ID: <Mgrx8p600awIE6nVN_@andrew.cmu.edu> MIME-Version: 1.0 Content-Type: text/plain An anonymous poster said: > Of course, even if the modems had NSA-proof encryption built > in, the victim could always intercept the decrypted data on the > DTE connector... cracking is and will remain a risky and > stupid thing to do... Most likely the DTE will be doing the encryption/decryption. Who would buy an expensive hardware encryption device when you can write terminal software to do it? Yeah, tapping 1200 and 2400 bps modems is prety easy to do. Actually you probably wouldn't even need to build filters or anything, just record the signal and connect it to a stock 2400 modem, then set the modem to originate or answer. The modem already has filters to decode the data, of course. You have to do it twice if you want to get both sides of the transmission tho.