[iwar] [fc:Web."camouflage".aims.to.beat.censors]

From: Fred Cohen (fc@all.net)
Date: 2002-07-23 07:23:04


Return-Path: <sentto-279987-5032-1027434072-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 23 Jul 2002 07:25:08 -0700 (PDT)
Received: (qmail 1418 invoked by uid 510); 23 Jul 2002 14:20:19 -0000
Received: from n30.grp.scd.yahoo.com (66.218.66.87) by all.net with SMTP; 23 Jul 2002 14:20:19 -0000
X-eGroups-Return: sentto-279987-5032-1027434072-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.98] by n30.grp.scd.yahoo.com with NNFMP; 23 Jul 2002 14:21:12 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 23 Jul 2002 14:21:11 -0000
Received: (qmail 46421 invoked from network); 23 Jul 2002 14:21:11 -0000
Received: from unknown (66.218.66.218) by m15.grp.scd.yahoo.com with QMQP; 23 Jul 2002 14:21:11 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 23 Jul 2002 14:21:11 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6NEN4127681 for iwar@onelist.com; Tue, 23 Jul 2002 07:23:04 -0700
Message-Id: <200207231423.g6NEN4127681@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 23 Jul 2002 07:23:04 -0700 (PDT)
Subject: [iwar] [fc:Web."camouflage".aims.to.beat.censors]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

New Scientist
 
Web "camouflage" aims to beat censors 
 
18:40 22 July 02
Will Knight
 
New computer software promises to undermine government and workplace
restrictions on internet use by camouflaging suspicious communications
within innocent internet traffic.  The banned content is returned hidden
inside innocuous-looking digital images. 
 
Computer scientists at Massachusetts Institute of Technology (MIT), in
the US, have developed the new software, called Infranet. 
 
They hope the program will eventually be used to defeat
government-enforced controls on internet use.  "As things progress we
definitely see it being used in China and Saudi Arabia," says MIT
researcher Nick Feamster. 
 
The team claims that unlike existing anti-censorship technology,
Infranet should leave virtually no trace.  Monitoring someone using
Infranet should only reveal apparently normal traffic going to
unrestricted web servers. 
 
Attracting suspicion
 
In order for Infranet to work, software must be installed on a user's
computer, as well as normal web servers beyond the national firewall. 
When someone requests a banned web page, a request will automatically be
made to an Infranet-enabled server.  The request is encoded in a series
of URLs which are indistinguishable to those used for normal
communications. 
 
An Infranet server will be able to decode the request and then deliver
the banned page.  But this page is hidden in an innocuous image by
subtly changing its underlying bits of information, without altering its
appearance.  This practice is called steganography. 
 
The team says web proxies, like Safeweb, route restricted content around
internet filters and controls, but can be identified and blocked
themselves.  Programs that make it possible to retrieve restricted
information through other personal computers, such as Triangle Boy, are
more difficult to detect, but also rely on encrypted communications. 
The researchers believe this can attract suspicion. 
 
Although a prototype of Infranet has been developed, the full version
will not be released for some months, Feamster says.  This is to ensure
there are no major bugs in the code: "It's not the sort of thing I would
want to release until its ready."
 
The team will present a paper outlining their research at the USENIX
security conference, held in San Francisco from 5 August 2002. 
 
18:40 22 July 02

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/7dY7FD/R_ZEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT