perhaps a silly question. but, can ISIS or others embed virues and trojans in their pdfs? i mean assuming u r downloading a pdf and not spoofed to an exe or self loading something. i am curious about some of their literature. but, not interested in the time it might take to cleanup after a download.

On 11/23/2015 12:00 PM, John Young wrote:
https://www.wired.com/wp-content/uploads/2015/11/ISIS-OPSEC-Guide.pdf
http://www.wired.com/2015/11/isis-opsec-encryption-manuals-reveal-terrorist-group-security-protocols/

So ISIS is well ahead of most worldwide users of popular comsec-privacy-
anonymizing tools, whether govs, coms, ngos, individuals, even hog-tied
and NDA'd experts, where failures are commonplace and comsec troubadors
forever yodel for always more advanced but less accessible, hardly understandable
must less easily usable programs and devices promoted by consultancies,
lectures, TEDs, tweets, emails, handbooks, Snowden's advisories to journos, training documentaries, YouTubes, contested open and classified standards,
and cascades of earnestly end to endless crypto evangelical campaigns.

Surely these ridiculous failures are outweighed by unknown successes. Surely, public use of crypto is making genuine progress. But who would know that by reading popular press and complaints on crypto fora where tales of screw ups
amuse the incarcerated.



_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to