On Wed, Aug 25, 2004 at 12:39:57AM +0200, Rolf Kutz wrote:
This depends on how the attack really works. If you just need to flip a few bits in a document it might just look like typos (think crc32). If your document is a tarball or a .deb you might be able to insert a lot of "garbage" to it without being noticed.
Right, but is someone inserting garbage into a .deb really a threat? I'd be more concerned about the insertion of malicious code... Mike Stone