>From: "Major Variola (ret)" <[EMAIL PROTECTED]>
>Sent: Aug 11, 2004 9:21 PM
>To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
>Subject: Forensics on PDAs, notes from the field

..
>Obvious lesson: Steganography tool authors, your programs
>should use the worm/HIV trick of changing their signatures
>with every invocation.  Much harder for the forensic
>fedz to recognize your tools.  (As suspicious, of course).

I would have thought the obvious lesson was to keep all your important work on an 
encrypted disk partition, with a good password and a high iteration count.  This is 
true not just for criminals and terrorists, but for anyone who doesn't want the 
information on their hard drive read by anyone who happens to steal their computer.  

--John





Reply via email to