[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Covert Access to Data and ID
John Young wrote:
> Thus, the more general question Dave has raised is how
> widespread is the development and implementation of
> technolgies for covert surveillance on the Web and in
> desktop boxes -- happily spreading quietly while attention
> is focussed on the very encryption which it will circumvent?
I don't know whether it is relevant but there is recently an
announcement of a conference on intrusion detection. Perhaps
one gets some relevant research results there presented.
M. K. Shen