[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Covert Access to Data and ID



John Young wrote:

> Thus, the more general question Dave has raised is how
> widespread is the development and implementation of
> technolgies for covert surveillance on the Web and in
> desktop boxes -- happily spreading quietly while attention
> is focussed on the very encryption which it will circumvent?

I don't know whether it is relevant but there is recently an
announcement of a conference on intrusion detection. Perhaps
one gets some relevant research results there presented.

M. K. Shen