Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

One of the classic ways to smuggle information out of a watched network is to encode the data in the time delays between packets that are sent.

Vincent Berk, Annarita Giani, and George Cybenko at Dartmouth College just published a technical report with techniques for ferreting out the use of such covert channels.

The problem with these channels, as the paper notes, is that they do not carry a lot of information. The advantage, of course, is that they are nearly invisible to most network managers.

0 comments about this story. Start the discussion »

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me