[3229] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Encryption is like a locked suitcase

daemon@ATHENA.MIT.EDU (Matthew James Gering)
Sun Aug 23 19:20:49 1998

From: Matthew James Gering <mgering@ecosystems.net>
To: "'cryptography@c2.net'" <cryptography@c2.net>
Date: Sat, 22 Aug 1998 22:11:41 -0700


> I am happy to host additional discussion on this topic on
> cryptography@c2.net, of course.

I tried to move the topic from coderpunks to cypherpunks, but it seems
to have better coverage in cryptography.

I had mentioned simply removing the harddrive and packing it separately
or carrying it in a jacket pocket (though it will look funny going thru
the change dish). Problem is it is much more usual to have customs
simply see if the laptop is operational (not a "b-word"). So, finally a
killer application for those old low-capacity laptop drives, the decoy
drive.

Similarly you can replace the MBR to boot to a benign partition, and
then switch it back afterwards. This is much easier, until they start
using boot floppies and fdisk to see partitions.

The real threat is if/when intelligence agencies decide to use customs
for covert commercial intelligence, and simply create a machine to do
byte-scan copies of harddisks for later analysis. Despite how easy it is
to "smuggle" data, they would gain a wealth of intel from business
travels who are too clueless to recognize the risk (see the already big
black-market for stolen exec laptops).

SETI Amateurs Club. There's a good front/excuse for carrying around lots
of random noise ;)

If you want to smuggle data, simply burn a CD with both audio and data
tracks and throw it into a walkman. It will be a number of years until
they numb the public enough to start confiscating walkmen from little
girls.

Why does Johnny Mnemonic come to mind?

	Matt

home help back first fref pref prev next nref lref last post