Covert Access to Data and ID

Mok-Kong Shen mok-kong.shen at stud.uni-muenchen.de
Thu Jul 9 01:14:25 PDT 1998


John Young wrote:

> Thus, the more general question Dave has raised is how
> widespread is the development and implementation of
> technolgies for covert surveillance on the Web and in
> desktop boxes -- happily spreading quietly while attention
> is focussed on the very encryption which it will circumvent?

I don't know whether it is relevant but there is recently an
announcement of a conference on intrusion detection. Perhaps
one gets some relevant research results there presented.

M. K. Shen






More information about the cypherpunks-legacy mailing list