Gidday ollie,
On 14-Apr-99, Oliver Wagner had the perspicacity to write, and I quote: "
>From what i read this week there is a proposal to alter the way e-mail is
sent. It will be split in three. Bit like ransom notes. Pick up one packet
and it tells you to go to somewhere else, pick up next packet, then that
tells you to go to a 3rd place to get the next. ..umm well.. sort of
something like that. Anyway it's meant to provide 'security by obfuscation' -
nice term. :-)
> That's totally easy, as you don't need to follow the full data stream,
> you just need to check for patterns. A standard linux installation
> with tcpdump and grep is enough to check a LAN for potential
> credit card data (or FTP passwords, or telnet logins, or POP3
> logins)
> The "Security by Obfuscation" approach doesn't provide security,
> just a false feeling of it (like implementing a crytographic strong
> cipher and using the output of time() as a key, like Netscape 2.x
> did :)
chhers,
Julia