Tracing the ‘Untraceable’
Monitoring at (or near) source
Packet sniffing (Carnivore)
Black boxes (RIP)
Intentional back doors in crypto
Lousy implementations
User error
Bad passphrase
including a .sig file
Previous slide
Next slide
Back to first slide
View graphic version