perhaps a silly question. but, can ISIS or others embed virues and
trojans in their pdfs?
i mean assuming u r downloading a pdf and not spoofed to an exe or self
loading something.
i am curious about some of their literature. but, not interested in the
time it might take to cleanup after a download.
On 11/23/2015 12:00 PM, John Young wrote:
https://www.wired.com/wp-content/uploads/2015/11/ISIS-OPSEC-Guide.pdf
http://www.wired.com/2015/11/isis-opsec-encryption-manuals-reveal-terrorist-group-security-protocols/
So ISIS is well ahead of most worldwide users of popular comsec-privacy-
anonymizing tools, whether govs, coms, ngos, individuals, even hog-tied
and NDA'd experts, where failures are commonplace and comsec troubadors
forever yodel for always more advanced but less accessible, hardly
understandable
must less easily usable programs and devices promoted by consultancies,
lectures, TEDs, tweets, emails, handbooks, Snowden's advisories to
journos,
training documentaries, YouTubes, contested open and classified
standards,
and cascades of earnestly end to endless crypto evangelical campaigns.
Surely these ridiculous failures are outweighed by unknown successes.
Surely,
public use of crypto is making genuine progress. But who would know
that by
reading popular press and complaints on crypto fora where tales of
screw ups
amuse the incarcerated.
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography