sdowney717
September 20th, 2010, 12:42 PM
http://www.wired.com/threatlevel/2010/01/operation-aurora/
email, source code, etc... from China. Email accounts targeted were human rights dissidents, etc...
Old news, but was thinking some about this.
What I was thinking is what process could you use to obfuscate, harden or eliminate an email attack where even if the raiders got information it would be useless to them?
You could encrypt the text?
What about the physical locations of email users computers? Is that obtainable in an attack?
What about the email addresses, could that be somehow dealt with such that intended destinations be hidden, sent thru an array of adresses from system to system?
Just thinking of ideas here.
Google announced Tuesday that it had been the target of a “highly sophisticated” and coordinated hack attack against its corporate network. It said the hackers had stolen intellectual property and sought access to the Gmail accounts of human rights activists. The attack originated from China, the company said.
Read More http://www.wired.com/threatlevel/2010/01/operation-aurora/#ixzz104LZWQd8
email, source code, etc... from China. Email accounts targeted were human rights dissidents, etc...
Old news, but was thinking some about this.
What I was thinking is what process could you use to obfuscate, harden or eliminate an email attack where even if the raiders got information it would be useless to them?
You could encrypt the text?
What about the physical locations of email users computers? Is that obtainable in an attack?
What about the email addresses, could that be somehow dealt with such that intended destinations be hidden, sent thru an array of adresses from system to system?
Just thinking of ideas here.
Google announced Tuesday that it had been the target of a “highly sophisticated” and coordinated hack attack against its corporate network. It said the hackers had stolen intellectual property and sought access to the Gmail accounts of human rights activists. The attack originated from China, the company said.
Read More http://www.wired.com/threatlevel/2010/01/operation-aurora/#ixzz104LZWQd8