Dec. 21st, 2006

jducoeur: (Default)
4.93 miles in 45 minutes = a sustained 6.57 MPH. Required spending pretty much that whole time in the cardio zone, but the fact that I can *do* almost 45 minutes in the cardio zone without discomfort is a good sign.

(Of course, that's all on the elliptical. Shouldn't fool myself into believing that translates directly into real running, which I know is harder on me...)
jducoeur: (Default)
4.93 miles in 45 minutes = a sustained 6.57 MPH. Required spending pretty much that whole time in the cardio zone, but the fact that I can *do* almost 45 minutes in the cardio zone without discomfort is a good sign.

(Of course, that's all on the elliptical. Shouldn't fool myself into believing that translates directly into real running, which I know is harder on me...)

Spamizdat

Dec. 21st, 2006 09:53 am
jducoeur: (Default)
So in my more paranoid moments, I contemplate the possibility of the government mounting a self-coup, and trying to turn the country into a truly authoritarian state. (I don't think the current Administration will, but that's more because I don't think they're competent enough than that they wouldn't like to do so.) In which case, the question arises: how do you organize the resistance? Specifically, how would such a hypothetical resistance communicate?

It's not an easy problem. I take it for granted that the government is monitoring at least a large fraction of electronic communications today -- I think it's likely that they're sniffing all email that goes through the main backbone of the Net. Lots of people say that Encryption Is the Answer, but that's just not true: until and unless encryption becomes truly widespread (and kudos to Microsoft, who are making a real effort to do that with their new network stack), if you use encryption you are *totally* obvious, and become an immediate target. Encryption is only really effective in such a situation if it doesn't *look* like encryption.

Which brings up the idea: what about hiding your secret messages in spam? I mean, think about it. Spam is everywhere today, and it's perfectly normal for ordinary, harmless machines to be sending it out. It accounts for a *huge* fraction of all email sent, and the government sniffers have to be filtering against it.

But spam *is* essentially an encryption mechanism, designed to be hard for machines to read but easy for humans to do so. Typical modern spam contains images full of random noise, and tons of randomly-chosen and often misspelled words -- loads of just the kind of entropy that makes for good data-hiding. Any software engineer who can't figure out how to harness that for hiding secret messages should hang up his keyboard. Done right, I bet it it would give the NSA *fits*. It's hard enough to recognize that a given message *is* spam -- I'd bet that figuring out that it isn't *really* spam, but actually contains embedded communication, is much harder.

So remember: when the time comes, and people are up against the wall, spam may prove to be your best friend...

Spamizdat

Dec. 21st, 2006 09:53 am
jducoeur: (Default)
So in my more paranoid moments, I contemplate the possibility of the government mounting a self-coup, and trying to turn the country into a truly authoritarian state. (I don't think the current Administration will, but that's more because I don't think they're competent enough than that they wouldn't like to do so.) In which case, the question arises: how do you organize the resistance? Specifically, how would such a hypothetical resistance communicate?

It's not an easy problem. I take it for granted that the government is monitoring at least a large fraction of electronic communications today -- I think it's likely that they're sniffing all email that goes through the main backbone of the Net. Lots of people say that Encryption Is the Answer, but that's just not true: until and unless encryption becomes truly widespread (and kudos to Microsoft, who are making a real effort to do that with their new network stack), if you use encryption you are *totally* obvious, and become an immediate target. Encryption is only really effective in such a situation if it doesn't *look* like encryption.

Which brings up the idea: what about hiding your secret messages in spam? I mean, think about it. Spam is everywhere today, and it's perfectly normal for ordinary, harmless machines to be sending it out. It accounts for a *huge* fraction of all email sent, and the government sniffers have to be filtering against it.

But spam *is* essentially an encryption mechanism, designed to be hard for machines to read but easy for humans to do so. Typical modern spam contains images full of random noise, and tons of randomly-chosen and often misspelled words -- loads of just the kind of entropy that makes for good data-hiding. Any software engineer who can't figure out how to harness that for hiding secret messages should hang up his keyboard. Done right, I bet it it would give the NSA *fits*. It's hard enough to recognize that a given message *is* spam -- I'd bet that figuring out that it isn't *really* spam, but actually contains embedded communication, is much harder.

So remember: when the time comes, and people are up against the wall, spam may prove to be your best friend...

Profile

jducoeur: (Default)
jducoeur

June 2025

S M T W T F S
12 34567
891011121314
15161718192021
22232425262728
2930     

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags