blackmail / real world stego use

Ed Gerck egerck at
Wed Aug 27 19:49:39 EDT 2003

bear wrote:

> On Wed, 27 Aug 2003, Ed Gerck wrote:
> >OTOH, it is possible that the dutch man was traced not by a one
> >time download of the image but by many attempts to find it,
> >since the upload time of the image to the site was not exactly
> >known to him and time was of essence. In this case, the required
> >tracing capability would NOT need a large capability for packet
> >recording and correlation. It would just include finding 100's
> >(or 1000's) of identical access occurrences in surfola's incoming
> >server traffic, after surfola's server was tagged from the website's
> >logs.
> The problem being here access to the website's logs. Getting the logs
> via a warrant and due process,

No, the website's logs mentioned above belongs to the victim -- who had no
problems in fully cooperating with law enforcement.

> which seems like a minimal exercise for
> a privacy server, is hard to do inside 24 hours.  It's much easier to
> believe that the FBI is keeping its own logs at hubs, routers, and
> switches connected to surfola, thereby eliminating the need for
> warrant service.

surfola connects upstream to someone, who is tapped before the
victim posts the image.

Ed Gerck

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list