Skip to comments.
Sending secret messages over public internet lines can take place with new technique
Eurekalert ^
| 10-Oct-2006
| Colleen Morrison
Posted on 10/10/2006 11:15:52 AM PDT by Teflonic
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-44 next last
If interested,
here's the pdf link to the full paper.
1
posted on
10/10/2006 11:15:53 AM PDT
by
Teflonic
To: Teflonic
You can be sure al-Qaeda is reading up on it.
2
posted on
10/10/2006 11:18:41 AM PDT
by
theDentist
(Qwerty ergo typo : I type, therefore I misspelll.)
To: Teflonic
It's is just spread-spectrum applied to optical.
3
posted on
10/10/2006 11:18:51 AM PDT
by
Dracian
To: theDentist
You can be sure al-Qaeda is reading up on it. Unless they own the electronics on both ends of the fiber, this knowledge wouldn't do anyone any good.
4
posted on
10/10/2006 11:19:57 AM PDT
by
Dracian
To: Dracian
Perhaps not immediately, but given time and breakthroughs...
5
posted on
10/10/2006 11:22:24 AM PDT
by
theDentist
(Qwerty ergo typo : I type, therefore I misspelll.)
To: Teflonic
Somewhere, somehow, this innovation will tie back to porn...it often seems to...
To: Dracian
Agreed. They will need fiber throughout the entire network in which the message travel. In my opinion, architecting a more appropriate public key infrastructure would make more sense.
7
posted on
10/10/2006 11:26:33 AM PDT
by
rit
To: theDentist
I would think you would need the cooperation of the cable guy (company).
Most optical transmissions end up or start out as electrical signals that need conversion to optical and then back.
To: Cold Heart
Uh huh.... all I'm saying is: for now. let's look again in 5 years or 10 years and see if it's commonplace.
9
posted on
10/10/2006 11:30:16 AM PDT
by
theDentist
(Qwerty ergo typo : I type, therefore I misspelll.)
To: Teflonic; All
Given the way message packets are transmitted over the Net today, I would guess it will be a while before this technology is universally applicable.
10
posted on
10/10/2006 11:32:04 AM PDT
by
econjack
To: Teflonic
First paragraph of the paper says:
".... if appropriate filters are used"
In short, only works in the lab. No real world application unless you 1) have physical access to both ends of the fiber or 2) can control the equipment between the two end points.
All it would take to kill this would be ONE optical filter designed to block the "noise". It would also be interesting to see how resilient this is to chromatic dispersion.
To: Teflonic
This is old stuff. For instance, properly trained observers can detect the tower in this picture:
12
posted on
10/10/2006 11:33:49 AM PDT
by
Izzy Dunne
(Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
To: Teflonic
Somewhere there is an NSA tech rolling on the floor laughing as he sits in his cube monitoring the seventh generation version of this hardware....
13
posted on
10/10/2006 11:34:15 AM PDT
by
Spktyr
(Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
To: Izzy Dunne
Dude, if that is a picture of your lady.... your are very blessed!
To: theDentist
Perhaps not immediately, but given time and breakthroughs... Why would Islamics spend all those resources on such an esotric means of communication when they can just go to the Mosque and make their plans in plain language?
You have to give them some credit for ROI (return on investment.) I mean they brought down the WTC with a couple of razor blades.
15
posted on
10/10/2006 11:44:30 AM PDT
by
Dracian
To: Izzy Dunne
Be nice and don't use too much of my bandwidth.......
16
posted on
10/10/2006 11:48:12 AM PDT
by
b4its2late
(I'm not insensitive, I just don't care.)
To: Izzy Dunne
I can't see the tower, the noise is too loud.
17
posted on
10/10/2006 11:49:00 AM PDT
by
Enterprise
(Let's not enforce laws that are already on the books, let's just write new laws we won't enforce.)
To: Dracian
Or just have multiple people log into the same email account, and leave messages in draft form for others to view?
To: rit
Agreed. They will need fiber throughout the entire network in which the message travel. In my opinion, architecting a more appropriate public key infrastructure would make more sense. Yeah, this type of technology is of interest to people who want secure links but rent their fiber from someone else. Since they can't be sure the fiber isn't being tapped if it is out of their control, they want end to end security. Hence this additional method, beyond encryption. It's stealth on top of encryption.
19
posted on
10/10/2006 11:50:33 AM PDT
by
Dracian
To: Izzy Dunne
I'll bet them things keep her warm during those cold Canadian winters.
20
posted on
10/10/2006 11:52:37 AM PDT
by
CholeraJoe
(USAF Air Rescue "That others may live.")
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-44 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson