[cryptography] ISIS’ OPSEC Manual

Givon Zirkind givonne at gmx.com
Mon Nov 23 12:04:17 EST 2015


perhaps a silly question.  but, can ISIS or others embed virues and 
trojans in their pdfs?
i mean assuming u r downloading a pdf and not spoofed to an exe or self 
loading something.
i am curious about some of their literature.  but, not interested in the 
time it might take to cleanup after a download.

On 11/23/2015 12:00 PM, John Young wrote:
> https://www.wired.com/wp-content/uploads/2015/11/ISIS-OPSEC-Guide.pdf
> http://www.wired.com/2015/11/isis-opsec-encryption-manuals-reveal-terrorist-group-security-protocols/ 
>
>
> So ISIS is well ahead of most worldwide users of popular comsec-privacy-
> anonymizing tools, whether govs, coms, ngos, individuals, even hog-tied
> and NDA'd experts, where failures are commonplace and comsec troubadors
> forever yodel for always more advanced but less accessible, hardly 
> understandable
> must less easily usable programs and devices promoted by consultancies,
> lectures, TEDs, tweets, emails, handbooks, Snowden's advisories to 
> journos,
> training documentaries, YouTubes, contested open and classified 
> standards,
> and cascades of earnestly end to endless crypto evangelical campaigns.
>
> Surely these ridiculous failures are outweighed by unknown successes. 
> Surely,
> public use of crypto is making genuine progress. But who would know 
> that by
> reading popular press and complaints on crypto fora where tales of 
> screw ups
> amuse the incarcerated.
>
>
>
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography



More information about the cryptography mailing list