On Fri, 26 Feb 2010 12:04:36 -0500 Robert J. Hansen <r...@sixdemonbag.org> articulated:
> Investigators also don't develop very many leads based on "gee, this > person uses crypto." Many more leads are developed based on kludge > investigation -- what security geeks call "traffic analysis." If they > nab a child pornographer and discover that you always emailed him > between one and three days before the child pornographer uploaded a > new set of images, well... that's the kind of interesting coincidence > which will start a federal investigation. The fact you have a crypto > key, not so much. Maybe not totally apropos to this discussion; however, I worked in "traffic analysis" for several years. If given enough leeway, you would be amazed at the information you can gather about an individual, and at its astonishing accuracy rate. Just listening on various mail forums, I have been able to learn more about certain individuals than they would believe possible, or want known. Its all in knowing (and having the proper equipment and authority) in where to look. -- Jerry ges...@yahoo.com |::::======= |::::======= |=========== |=========== | tomorrow you may no longer feel guilty. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users