From: Eugene Leitl (eugene.leitl@lrz.uni-muenchen.de)
Date: Fri Oct 01 1999 - 18:53:19 MDT
Cast secure algorithms into immutable hardware, use strong crypto with
partos of the secret distributed to several parties.
Masks/capes might cloak you against the more primitive video
surveillance, but neuronal DSP will identify you on your mannerism (as
we learned today, it works with speech, it is only a matter of time
until it works with video. Or body odor (MHC fragments) fingerprint).
A solution would seam to use identical hardware remotes/proxies with
crypting/diffusing the traffic to make it untraceable.
It would seem a very good idea to not let this happen too
easily. Pilot projects on face recognition for criminal deterrance are
on the way, and ubiquitous cameras are certainly proliferating. A
carnival, anybody?
Brian D Williams writes:
> *U.S. Army special agents from the Army Criminal Investigation
> Command have 'proved' that NetBus and Back Orifice can be used to
> hijack desktop camera and microphone applications for the purposes
> of industrial espionage, spying or to gather evidence for a
> criminal investigation. The commandeered cameras and microphones
> can then secretly send data to a monitoring station unbeknownst to
> the end user.
> http://www.pcworld.com/pcwtoday/article/0,1510,12891,00.html
This archive was generated by hypermail 2.1.5 : Fri Nov 01 2002 - 15:05:22 MST