Establishing big brother using covert channels and other covert techniques

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Weiser,s vision about computers in the next century is thatthey will be ubiquitous and in MIT's Media Lab project, called Things That Think, they will be embedded in such objects as shoes, belt buckles, tie clasps, etc. In this paper we explain how covert technology, such as covert channels, covert sensors and covert computing facilitates the set up of Big Brother, for example in a society where computers are ubiquitous. Detecting the absence of covert hardware and covert software is actually undecidable and cryptography alone seems inadequate to protect against the abuse of covert technology, extending the work of Anderson regarding the limitations of cryptography. Also, the use of covert technology to protect copyright can be abused to suppress freedom of expression.

Cite

CITATION STYLE

APA

Desmedt, Y. (1996). Establishing big brother using covert channels and other covert techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1174, pp. 65–71). Springer Verlag. https://doi.org/10.1007/3-540-61996-8_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free