Error - template LAYOUT-DATA-WRAPPER not found

A configuration error was detected in the CGI script; the LAYOUT-DATA-WRAPPER template could not be found.

Error - template STYLE-SHEET not found

A configuration error was detected in the CGI script; the STYLE-SHEET template could not be found.

Error - template SUB-TOP-BANNER not found

A configuration error was detected in the CGI script; the SUB-TOP-BANNER template could not be found.
Subject:
From:
David Gillett <[log in to unmask]>
Reply To:
PCSOFT - Personal Computer software discussion list <[log in to unmask]>
Date:
Thu, 25 Mar 1999 15:11:48 -0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (38 lines)
On 25 Mar 99, at 8:18, Jim Meagher wrote:

> IN ADDITION, consider that the internet is a PACKET SWITCHING network
> -- which means that your message is chopped up into many pieces
> (packets - packages) that are each sent (in many/most cases) by a
> different route.  All the individual pieces do not "flow" down the
> "highway" one behind the other in a nice logical progression.

  While ordering of packets is not guaranteed -- plaintext credit card
numbers are likely to be safe *IF* they are split amongst several
packets -- the topology of the net is not really an amorphous mesh.
It's more like a tree with a trunk (backbone) and smaller and smaller
branches and finally leaves.  A sniffer located at the base of one
"branch" could see all traffic between nodes (leaves or branches) on
that branch, and locations on any *other* branch.  [Traffic between two
small branches that are on the same big branch may not need to pass the
sniffer....]
  The point is only that despite the Internet's packet-switched
protocols, there are points in between you and any server where your
messages may be intercepted and read.  [There is a building a few miles
from me, over at NASA's Ames Research Center; it is estimated that as
much as a third of all Internet traffic flows through that building on
its way from place to place.  It's rumoured, by those who believe in
conspiracy theories, to be one of the six or so strategic locations
where the NSA monitors Internet traffic....]

  Ordinarily, it's convenient to think of the Internet as a "cloud"
where you drop things in at one point and they reappear later at
another.  But that convenient metaphor is just a little too simplified
for an accurate security assessment.


David G

                PCSOFT mailing list is brought to you by:
                            The NOSPIN Group
                            http://nospin.com

ATOM RSS1 RSS2

LISTSERV.ICORS.ORG Secured by F-Secure Anti-Virus CataList Email List Search Powered by LISTSERV