I don’t think you can detect an intercept/wiretap at all, anymore than you can detect a file being copied once you distribute it. Telecoms can log anything, I suppose some traffic analysis might reveal logging if its resource-intensive for your service provider (and you’re lucky to make the correlation), but I’d be nothing you could really depend on.
Assume the telecoms are a hostile black box, place tinfoil hat firmly on head… :)
Maybe you could secure VoIP communications (or whatever) with TLS/SSL or something. Or make a keyring-based voice/data streaming network. Gives a whole new meaning to “family & friends” plan, eh?
2 comments (oldest first)
I don’t think you can detect an intercept/wiretap at all, anymore than you can detect a file being copied once you distribute it. Telecoms can log anything, I suppose some traffic analysis might reveal logging if its resource-intensive for your service provider (and you’re lucky to make the correlation), but I’d be nothing you could really depend on.
Assume the telecoms are a hostile black box, place tinfoil hat firmly on head… :)
Maybe you could secure VoIP communications (or whatever) with TLS/SSL or something. Or make a keyring-based voice/data streaming network. Gives a whole new meaning to “family & friends” plan, eh?
Am sure they is a way one can scramble the streaming to detect the IP level bug. Thanks for your wisdom. jeff.
Add a comment
Before you add a comment you must be signed up – it takes about 30 seconds. Sign up now.