Links
- Season 1 Winner
- Season 2 Winner
- Season 3 Winner
- Season 4 Winner
- Season 5 Winner
- Season 6 Winner
- Season 7 Winner
- Season 8 Winner
- Season 9 Winner
- Season 10 Winner
- Exhibit A Winner
- Exhibit B Co-Winner
- Exhibit B Co-Winner
- Friends and Rivals Winner
- Agirlnamedluna
- Alexpgp
- Erica_crawford aka meirion
- Kittymichaels
- lee_hawk
- Walkertxkitty
- blueashke
- Your Host
- Go Shopping!
- Donate!
Active Entries
Style Credit
- Style: Neutral Good for Practicality by
Expand Cut Tags
No cut tags
Re: Resource Post
Date: 2014-12-09 12:31 pm (UTC)That said, if you spoofed someone's biometrics (or went full-on Demolition Man and brought their eyeballs with you), you could get access to what they would normally have access. So you could go straight to their Gmail or Tor "Sent" folder and see what they'd sent. (Not quite the same as "intercept.")
(Or, if you want to do it the hard way, break into some network admin's onion router using their biometric data, turn on any sniffing capability the router might have, and then wait to see if it's susceptible to a timing attack. But you'd need to do that well in advance of the e-mail being sent, and you'd have to filter out the e-mails you had no interest in.)
So, short answer: I think they hand-waved a bit there, because the biometrics aren't the interesting part.