Being safe on the internet (was Re: Here we go again - ISP DPI, but is it interception?)

Tom Thomson colinthomson1 at
Tue Aug 3 23:56:28 BST 2010

> > Yes, but if Cuthbert just moved up the tree to look at directory
> > roots as in my example than that isn't obviously non-authorised.
> > Some website owners want you to do that and provide a helpful menu
> > or index for you. Some website owners don't want you to do that. The
> > way to tell which is which is by trying.
> Peter Sommer said that rather than say what he'd done, he instead
> presented some story about proxy activity.  That does rather
> complicate the story.
I wonder if the dialogue went like this:

	Plod: But you attempted an unauthorised directory transfer.
	C: No - if anything like that happened it must have been something done by a 	proxy server, I didn't do it.
	Plod: But we can clearly see from the log on your PC that you were at and the typed
	C: Yes, of course I did that.  That's the natural thing to do.

Or something pretty close to that, adapted by Plod to look a little more incriminating (that sort of adaptation is what used to be known as a "verbal" - and for it to have a commonly used name it probably had to be a commonly occurring thing; and far worse things happen even today).


More information about the ukcrypto mailing list