Such hosting sites are all over the place, as you can find with a little googling. We are going off of very little information at the moment, but let's imagine some fictional things.įirst, we need to figure out what is meant by a file or hosting site in Turkey. With the keys found on the USB drive, we can now start decrypting things that were a mystery before. But it has the bad property that once discovered, it now becomes easier to track. It has the has the property of security through obscurity, which is that it has the nice property of evading detection for a while because we'd never consider that ISIS would do such a strange thing. Tl dr: The NSA should be able to go back through it's rolling 90 day backlog of Internet metadata and find all other terrorist cells using this method.įrom what we can piece together from the NYTimes article, it appears that ISIS is passing around TrueCrypt container files as a way of messaging. You’re up for writing the blog post “detecting TrueCrypt/encrypt blob transfers” on the wire…
0 Comments
Leave a Reply. |