Spoofing Clipper

David Koontz koontzd at lrcs.loral.com
Thu Jun 2 16:50:09 PDT 1994



I had a fun idea.  Imagine getting enough information together to
spoof clipper transmissions?  The idea being to disguise other types
of secure transmissions as clipper ones. 

What would be needed would the escrow encryption identifer, a bunch of
damaged LEAF/IV assemblies and a transmission channel that wouldn't
be easily distinguishable from data portions of a clipper transmission.
You start the channel up prepending one of a large number of spoofed
LEAF/IV assemblies.  

With enough of these traversing the ether, the chaff/wheat noise ratio
goes down to where having a source identifier (ID in the LEAF) gets
real hit or miss - to where it loses traffic analysis value.  Sort of
growing weeds intentionally on the information superhighway.






More information about the cypherpunks-legacy mailing list