On Tue, Aug 14, 2001 at 03:01:36PM -0500, Jim wrote: > > Menwith Hill! Ha! AS IF every danged wireline > circuit ran though there! I wish SOMEBODY > would tally up just how much *real* compute > power would be needed to do 1/100th of what > they *claim* Echelon is capable of ... > One of my friends loves the Echelon people so much that he configured his mail agent ("mutt" I think) that way that it adds to each message the additionall header lines: X-encr-line1:Pp354232fj65340wdfgmj*^$%45estreretrhfghh X-encr-line2:fbghy6634132we3$%&*&refdsf345344543534545 ... Certainly the each line contains the random characters generated by a really good random number generator, Yes, I know it causes the vasting of bandwith, but probably steals a lot of Echelon computing power as well. BTW. If someone really wants to send something which should be hidden, the best method for him is to hide the message with steganographic techniques (see http://members.tripod.com/steganography/stego/softwareunix.html ) in a big ".jpg" file (eg. "My new wonderful car" or so) and send it not to the real recipient but just to the public forum (eg. alt.binaries.pictures.... ) with a previously agreed subject. The real recipient can retrieve the message without leaving almost any traces that the hidden message was transferred. (Sender can additionally use MixMaster or another anonymizing system). Well, "Echelon" may be good in stealing of trade secrets or investigating of dummiest criminals. The really dangerous people probably know much better methods than described above (which anyway is Echelon-safe). -- Regards, Wojciech M. Zabolotny http://www.ise.pw.edu.pl/~wzab <--> wzab@ise.pw.edu.pl http://www.debian.org Linux - free OS for free people! -- http://www.piclist.com hint: To leave the PICList mailto:piclist-unsubscribe-request@mitvma.mit.edu