LinuxLingam wrote:

"The NMT has been made functional since October last year, though work is on to improve the software. The CBI has “officially” used it in four to five cases related to organised crime and terrorism.

Two or three things ...


1. A lot of email is sent "in the clear" - plain text. Stick a packet sniffer of some sort in there and set it to sniff all connections coming from whichever IP the monitored party is logged in to. Quite simple.

2. "sneak into a computer"? Maybe use a keylogger - download it onto the guy's machine ... god knows, most users are dumb enough to click on anything they get and install it. Then even his key passphrase is compromised. Of course, the government does have this completely unenforced, and unenforceable rule, that users of strong cryptography must deposit a copy of their keypair in escrow ...

3. And maybe, as the government already gets one of the guy's passwords (the one he uses at his ISP) without too much trouble, they have a very good starting point when they start to try guess his other passwords.

srs

_______________________________________________
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

Reply via email to