Covert Access to Data and ID
Mok-Kong Shen
mok-kong.shen at stud.uni-muenchen.de
Thu Jul 9 01:14:25 PDT 1998
John Young wrote:
> Thus, the more general question Dave has raised is how
> widespread is the development and implementation of
> technolgies for covert surveillance on the Web and in
> desktop boxes -- happily spreading quietly while attention
> is focussed on the very encryption which it will circumvent?
I don't know whether it is relevant but there is recently an
announcement of a conference on intrusion detection. Perhaps
one gets some relevant research results there presented.
M. K. Shen
More information about the cypherpunks-legacy
mailing list