Re: Forensics on PDAs, notes from the field
13 Aug
2004
13 Aug
'04
12:49 p.m.
From: "Major Variola (ret)" <mv@cdc.gov> Sent: Aug 11, 2004 9:21 PM To: "cypherpunks@al-qaeda.net" <cypherpunks@al-qaeda.net> Subject: Forensics on PDAs, notes from the field
...
Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As suspicious, of course).
I would have thought the obvious lesson was to keep all your important work on an encrypted disk partition, with a good password and a high iteration count. This is true not just for criminals and terrorists, but for anyone who doesn't want the information on their hard drive read by anyone who happens to steal their computer. --John
7436
Age (days ago)
7436
Last active (days ago)
0 comments
1 participants
participants (1)
-
John Kelsey