[cryptography] ISIS’ OPSEC Manual
givonne at gmx.com
Mon Nov 23 12:04:17 EST 2015
perhaps a silly question. but, can ISIS or others embed virues and
trojans in their pdfs?
i mean assuming u r downloading a pdf and not spoofed to an exe or self
i am curious about some of their literature. but, not interested in the
time it might take to cleanup after a download.
On 11/23/2015 12:00 PM, John Young wrote:
> So ISIS is well ahead of most worldwide users of popular comsec-privacy-
> anonymizing tools, whether govs, coms, ngos, individuals, even hog-tied
> and NDA'd experts, where failures are commonplace and comsec troubadors
> forever yodel for always more advanced but less accessible, hardly
> must less easily usable programs and devices promoted by consultancies,
> lectures, TEDs, tweets, emails, handbooks, Snowden's advisories to
> training documentaries, YouTubes, contested open and classified
> and cascades of earnestly end to endless crypto evangelical campaigns.
> Surely these ridiculous failures are outweighed by unknown successes.
> public use of crypto is making genuine progress. But who would know
> that by
> reading popular press and complaints on crypto fora where tales of
> screw ups
> amuse the incarcerated.
> cryptography mailing list
> cryptography at randombit.net
More information about the cryptography