On Wed, 11 Aug 2004, Major Variola (ret) wrote:
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools. (As suspicious, of course).
It should be
Saint John of Cryptome has a particularly tasty link to
http://csrc.nist.gov/publications/drafts.html#sp800-72
which describes the state of the art in PDA forensics.
There is also a link to a CDROM of secure hashes of
various benign and less benign programs that the
NIST knows about. Including a
Yeah, about as brilliant as a turd. Didn't they recently call Al-Qaeda's
network a hydra? correct me if I don't recall my Ancient Greek myths, but
when you cut off one head on the hydra, two more grow back, so are we to
assume that future heads that grow back will carry such bounties?
A
ABC News is offering a report this evening on how
the Internet may be helping terrorism. For it Cryptome was
grilled and taped yesterday for aiding and abetting. We
confessed it's due to brain-liberating by the manchurian
cypherpunks.
Maybe Bin Laden would turn himself in in return for a billion $ for
his cause (through a middle-man of course).
Seem to remember that Bin Laden was relatively wealthy himself (100
M$?), but you'd have to balance these rewards to not be too
excessively much more than net worth of the individual.
Original URL:
http://www.theregister.co.uk/2004/08/11/al_q_geek_us_overthrow_plot/
Al-Qaeda computer geek nearly overthrew US
By Thomas C Greene (thomas.greene at theregister.co.uk)
Published Wednesday 11th August 2004 16:45 GMT
Update A White House with a clear determination to draw paranoid
Nah, if Bush already had him in a hole somewhere to produce him just in
time for the elections, he'd collect the billion for himself as his
personal reward.
--Kaos-Keraunos-Kybernetos---
+ ^ + :Our enemies are innovative and resourceful, and so are