One of the classic ways to smuggle information out of a watched network is to encode the data in the time delays between packets that are sent.
Vincent Berk, Annarita Giani, and George Cybenko at Dartmouth College just published a technical report with techniques for ferreting out the use of such covert channels.
The problem with these channels, as the paper notes, is that they do not carry a lot of information. The advantage, of course, is that they are nearly invisible to most network managers.
Here’s how a Twitter engineer says it will break in the coming weeks
One insider says the company’s current staffing isn’t able to sustain the platform.
Technology that lets us “speak” to our dead relatives has arrived. Are we ready?
Digital clones of the people we love could forever change how we grieve.
How to befriend a crow
I watched a bunch of crows on TikTok and now I'm trying to connect with some local birds.
Starlink signals can be reverse-engineered to work like GPS—whether SpaceX likes it or not
Elon said no thanks to using his mega-constellation for navigation. Researchers went ahead anyway.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.