Nostra2004@Safe-mail.net wrote:
I believe programs that search for spelling and style characteristics can be largely thwarted by passing the text through at least two language translation programs and tweaking the text to remove obvious semantic errors. The translators will also, often, help do an inadvertent spell checking when they can't identify the English word, leaving it untouched.
Here is an example of passing the above paragraph through a English-Russian-English transform using http://www.translate.ru :
"I believe to programs that searches for spelling and develops features, it is possible to stir substantially, transferring the text at least through two language programs of translation and ?????????? the text to remove obvious semantic mistakes. Translators will be also, often, to help to do the negligent period checking when they cannot identify an English word, leaving it is untouched."
Leaving in the cyrillic selected by the translator for the word "tweaking" may help throwt automated style analysis programs.
Here's the same paragraph transformed through German:
"I believe programs which can look for the orthography and style qualities be mainly crossed, the text by at least two linguistic translation programs passing and the text pinching to remove evident semantic mistakes. The translators will also help often to do an inattentive period examination if they cannot identify the English word, it untouched leaving."
Nostra
If you are that worried about someone identifying you, maybe sending the sensitive information out unencrypted over the Internet to an easily identifiable third-party that can be monitored is a bad idea. Downloading the software is not much better, as it is still a very distinctive feature. When doing anything for the sake of anonymity you must consider both your threat model and your anonymity set. A perfectly secure network is worthless if the bar to entry is so high that only a few people ever join. Even if you could only ever know something came from someone on the network, that fact alone would reduce the number of individuals that could be responsible to fewer than if they hadn't bothered with the network. _______________________________________________ i2p mailing list i2p@i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
participants (1)
-
Tom Kaitchuck