Date: Mon, 21 Feb 2000 03:10:12 -0600 (CST) From: Jim Bryant <jbryant@ppp-208-188-200-9.dialup.kscymo.swbell.net> To: freebsd@gndrsh.dnsmgr.net (Rodney W. Grimes) Cc: matt@ARPA.MAIL.NET, security@FreeBSD.ORG Subject: Re: Strange Spam Message-ID: <200002210910.DAA77643@ppp-208-188-200-9.dialup.kscymo.swbell.net> In-Reply-To: <200002210737.XAA58181@gndrsh.dnsmgr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
In reply: > > This is funny, reading it more carefully - there are also references to > > DARPA (Defense Advanced Research Projects Agency), UHF (Ultra High > > Frequency), and Interpol. > > > > Also, Mathematic is mispelled to "Mathematik" which strikes me as odd, > German/Danish dictionary? fits with the From: username... zuber-something. i'm not a linguist, but i can recognize a lot of languages by their sound. > Another think to yourself for a long hard time about _why_ someone might > try to use this form (bulk email) of communications and cryptography of > a weak form to get a message to someone. They probably don't care that > the NSA could crack this in a day, but they do care that every other > person could just read it. and we all know that all attempts to legislate tracability in spam have been blocked by spammers. worldwide. if you wanted to coordinate a terrorist op, or something covert and get a message to the operatives or the coordinator, spam is one way to do it without being caught. i'm not condoning this by stating this, my personal belief is that absolute untamperable tracability should be mandated as part of the protocols themselves. > It could say ``Nuclear launch in 6 hours from this transmission'' and > it wouldn't matter that the NSA could crack it in 12 hours, just so long > as all the ``agents'' knew that in 6 hours all hell was going to break > loose around the globe and they need to take care of the last minute > details. exactly. the usable lifespan of the plaintext is a serious consideration. > Your assuming the sender of the message has/had a way to get the receipents > public key. If the receipent is at an unknown location (also explaining > why this is going out as mass email/spam) how would you get his/her key to > encrypt with? do cuba and other countries mail militia schizos the pad after the numbers are sent? no. the pad is already in the recipients possession. it becomes a matter of finding the individual. even though the destination was the ukraine, and i am speaking from an american point of view, in the reverse situation, my arguments for tracability still apply. jim -- All opinions expressed are mine, if you | "I will not be pushed, stamped, think otherwise, then go jump into turbid | briefed, debriefed, indexed, or radioactive waters and yell WAHOO !!! | numbered!" - #1, "The Prisoner" ------------------------------------------------------------------------------ KC5VDJ - HF to 23cm KC5VDJ@NW0I.#NEKS.KS.USA.NOAM kc5vdj@swbell.net ------------------------------------------------------------------------------ IC-706MkII - IC-T81A - HTX-202 - HTX-212 - HTX-404 - KPC3+ - PK-232MBX/DSP To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200002210910.DAA77643>
