Return-Path: <sentto-279987-5032-1027434072-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 23 Jul 2002 07:25:08 -0700 (PDT) Received: (qmail 1418 invoked by uid 510); 23 Jul 2002 14:20:19 -0000 Received: from n30.grp.scd.yahoo.com (66.218.66.87) by all.net with SMTP; 23 Jul 2002 14:20:19 -0000 X-eGroups-Return: sentto-279987-5032-1027434072-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.98] by n30.grp.scd.yahoo.com with NNFMP; 23 Jul 2002 14:21:12 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 23 Jul 2002 14:21:11 -0000 Received: (qmail 46421 invoked from network); 23 Jul 2002 14:21:11 -0000 Received: from unknown (66.218.66.218) by m15.grp.scd.yahoo.com with QMQP; 23 Jul 2002 14:21:11 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 23 Jul 2002 14:21:11 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6NEN4127681 for iwar@onelist.com; Tue, 23 Jul 2002 07:23:04 -0700 Message-Id: <200207231423.g6NEN4127681@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 23 Jul 2002 07:23:04 -0700 (PDT) Subject: [iwar] [fc:Web."camouflage".aims.to.beat.censors] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: New Scientist Web "camouflage" aims to beat censors 18:40 22 July 02 Will Knight New computer software promises to undermine government and workplace restrictions on internet use by camouflaging suspicious communications within innocent internet traffic. The banned content is returned hidden inside innocuous-looking digital images. Computer scientists at Massachusetts Institute of Technology (MIT), in the US, have developed the new software, called Infranet. They hope the program will eventually be used to defeat government-enforced controls on internet use. "As things progress we definitely see it being used in China and Saudi Arabia," says MIT researcher Nick Feamster. The team claims that unlike existing anti-censorship technology, Infranet should leave virtually no trace. Monitoring someone using Infranet should only reveal apparently normal traffic going to unrestricted web servers. Attracting suspicion In order for Infranet to work, software must be installed on a user's computer, as well as normal web servers beyond the national firewall. When someone requests a banned web page, a request will automatically be made to an Infranet-enabled server. The request is encoded in a series of URLs which are indistinguishable to those used for normal communications. An Infranet server will be able to decode the request and then deliver the banned page. But this page is hidden in an innocuous image by subtly changing its underlying bits of information, without altering its appearance. This practice is called steganography. The team says web proxies, like Safeweb, route restricted content around internet filters and controls, but can be identified and blocked themselves. Programs that make it possible to retrieve restricted information through other personal computers, such as Triangle Boy, are more difficult to detect, but also rely on encrypted communications. The researchers believe this can attract suspicion. Although a prototype of Infranet has been developed, the full version will not be released for some months, Feamster says. This is to ensure there are no major bugs in the code: "It's not the sort of thing I would want to release until its ready." The team will present a paper outlining their research at the USENIX security conference, held in San Francisco from 5 August 2002. 18:40 22 July 02 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Will You Find True Love? Will You Meet the One? Free Love Reading by phone! http://us.click.yahoo.com/7dY7FD/R_ZEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT