Re: Psuedo-Private Key (eJazeera)
21 Nov
2002
21 Nov
'02
4:35 a.m.
More than this, they will have unknowingly destroyed the real data. Not possible in the real world - you will only be reading from the message to create the "decoded" image, not overwriting it (under any circumstances) if the system required a overwritable message, then it both wouldn't work with most email software, and would be presented with a *copy* of
at Wednesday, November 20, 2002 7:19 PM, Tyler Durden <camera_lumina@hotmail.com> was seen to say: the email by any attacker anyhow. Replaying and/or re-downloading email is trivial. Systems such as Disappearing Inc are good examples of this sort of snakeoil though - attempts to make email "expire" that can be broken by replacing the official executable with one that caches the keys.
8067
Age (days ago)
8067
Last active (days ago)
0 comments
1 participants
participants (1)
-
David Howe