Dave Korn wrote: > > That's gotta stand out like a statistical sore thumb. > > > The article is pretty poor if you ask me. It outlines three techniques for > stealth: steganography, using a shared email account as a dead-letter box, and > blocking or redirecting known IP addresses from a mail server. Then all of a > sudden, there's this conclusion ... > > " Internet-based attacks are extremely popular with terrorist organizations > because they are relatively cheap to perform, offer a high degree of > anonymity, and can be tremendously effective. " > > ... that comes completely out of left-field and has nothing to do with > anything the rest of the article mentioned. I would conclude that someone's > done ten minutes worth of web searching and dressed up a bunch of > long-established facts as 'research', then slapped a "The sky is falling! > Hay-ulp, hay-ulp" security dramaqueen ending on it and will now be busily > pitching for government grants or contracts of some sort.
This struck me oddly as well. I cannot think of a single significant Internet attack which has been traced to any terrorist organizations. I would agree that this article seems to be designed to alarm rather than inform, and, no doubt, pick up a government contract. Additionally, the author seems to make a big deal about asymmetric encryption without considering how key exchange is accomplished. The logistics of key exchange remains one of the vulnerabilities any asymmetric encryption system. -- ------------------------------------- [EMAIL PROTECTED] No one can understand the truth until he drinks of coffee's frothy goodness. ~~Sheik Abd-al-Kadir --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]