Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Feb 2000 03:10:12 -0600 (CST)
From:      Jim Bryant <jbryant@ppp-208-188-200-9.dialup.kscymo.swbell.net>
To:        freebsd@gndrsh.dnsmgr.net (Rodney W. Grimes)
Cc:        matt@ARPA.MAIL.NET, security@FreeBSD.ORG
Subject:   Re: Strange Spam
Message-ID:  <200002210910.DAA77643@ppp-208-188-200-9.dialup.kscymo.swbell.net>
In-Reply-To: <200002210737.XAA58181@gndrsh.dnsmgr.net>

next in thread | previous in thread | raw e-mail | index | archive | help

In reply:
> > This is funny, reading it more carefully - there are also references to
> > DARPA (Defense Advanced Research Projects Agency), UHF (Ultra High
> > Frequency), and Interpol. 
> > 
> > Also, Mathematic is mispelled to "Mathematik" which strikes me as odd,
> German/Danish dictionary?

fits with the From: username...  zuber-something.  i'm not a linguist,
but i can recognize a lot of languages by their sound.

> Another think to yourself for a long hard time about _why_ someone might
> try to use this form (bulk email) of communications and cryptography of
> a weak form to get a message to someone.  They probably don't care that
> the NSA could crack this in a day, but they do care that every other
> person could just read it.

and we all know that all attempts to legislate tracability in spam
have been blocked by spammers.  worldwide.  if you wanted to
coordinate a terrorist op, or something covert and get a message to
the operatives or the coordinator, spam is one way to do it without
being caught.

i'm not condoning this by stating this, my personal belief is that
absolute untamperable tracability should be mandated as part of the
protocols themselves.

> It could say ``Nuclear launch in 6 hours from this transmission'' and
> it wouldn't matter that the NSA could crack it in 12 hours, just so long
> as all the ``agents'' knew that in 6 hours all hell was going to break
> loose around the globe and they need to take care of the last minute
> details.

exactly.  the usable lifespan of the plaintext is a serious
consideration.

> Your assuming the sender of the message has/had a way to get the receipents
> public key.  If the receipent is at an unknown location (also explaining
> why this is going out as mass email/spam) how would you get his/her key to
> encrypt with?

do cuba and other countries mail militia schizos the pad after the
numbers are sent?  no.  the pad is already in the recipients
possession.  it becomes a matter of finding the individual.

even though the destination was the ukraine, and i am speaking from an
american point of view, in the reverse situation, my arguments for
tracability still apply.

jim
-- 
All opinions expressed are mine, if you    |  "I will not be pushed, stamped,
think otherwise, then go jump into turbid  |  briefed, debriefed, indexed, or
radioactive waters and yell WAHOO !!!      |  numbered!" - #1, "The Prisoner"
------------------------------------------------------------------------------
KC5VDJ - HF to 23cm      KC5VDJ@NW0I.#NEKS.KS.USA.NOAM       kc5vdj@swbell.net 
------------------------------------------------------------------------------
  IC-706MkII - IC-T81A - HTX-202 - HTX-212 - HTX-404 - KPC3+ - PK-232MBX/DSP


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200002210910.DAA77643>