1998-07-09 - Re: Covert Access to Data and ID

Header Data

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: cypherpunks@toad.com
Message Hash: de0fed67f2b34425d197528a1e7bdb22b81b81a8b5081342580762aa8ce10206
Message ID: <35A47BD1.1F51A0D5@stud.uni-muenchen.de>
Reply To: <199807081547.LAA21623@camel14.mindspring.com>
UTC Datetime: 1998-07-09 08:14:25 UTC
Raw Date: Thu, 9 Jul 1998 01:14:25 -0700 (PDT)

Raw message

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Thu, 9 Jul 1998 01:14:25 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Covert Access to Data and ID
In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com>
Message-ID: <35A47BD1.1F51A0D5@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:

> Thus, the more general question Dave has raised is how
> widespread is the development and implementation of
> technolgies for covert surveillance on the Web and in
> desktop boxes -- happily spreading quietly while attention
> is focussed on the very encryption which it will circumvent?

I don't know whether it is relevant but there is recently an
announcement of a conference on intrusion detection. Perhaps
one gets some relevant research results there presented.

M. K. Shen





Thread