Re: PRISM/AP kerfluffle, etc
Posted by
Marcus G. Daniels on
Jul 15, 2013; 4:33pm
URL: http://friam.383.s1.nabble.com/The-AP-kerfuffle-tp7583146p7583425.html
"How would you turn this into a usable tool?"
If one knew all communication events between all possible hosts over time,
then that organization could identify the likely relevant endpoint security
to attack (e.g. using a library of purchased zero-day exploits) on, say,
the likely paths of Tor connection. If they could compromise all of those
hosts, they could get behind the encryption when the next conversation
occurred.
Marcus
--------------------------------------------------------------------
mail2web.com – Enhanced email for the mobile individual based on Microsoft®
Exchange -
http://link.mail2web.com/Personal/EnhancedEmail============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe
http://redfish.com/mailman/listinfo/friam_redfish.com