1993-10-04 - Another application for stego (was POISON PILL)

Header Data

From: remail@tamsun.tamu.edu
To: cypherpunks@toad.com
Message Hash: 86ed326b85a51034a7d62cd85b25a9a79aaee651c871a4fa28cf589068db5d2b
Message ID: <9310040509.AA25224@tamsun.tamu.edu>
Reply To: N/A
UTC Datetime: 1993-10-04 05:09:57 UTC
Raw Date: Sun, 3 Oct 93 22:09:57 PDT

Raw message

From: remail@tamsun.tamu.edu
Date: Sun, 3 Oct 93 22:09:57 PDT
To: cypherpunks@toad.com
Subject: Another application for stego (was POISON PILL)
Message-ID: <9310040509.AA25224@tamsun.tamu.edu>
MIME-Version: 1.0
Content-Type: text/plain


Matthew Gream:
> ....if you have something
> you _don't_ want found, then simply encrypting it leaving it sitting on 
> your system is probably not going to work. You may decide not to answer
> any questions about it, you may refuse and so on, but they are going to
> want the magic little key and keep pressing (maybe while you are under
> oath). To prevent any of this occuring, the best approach (in my mind) is
> to encrypt it into a form that will never be suspect as anything more than
> harmless, trivial, information.

Interesting: an application of steganography that is quite useful
even where crypto is legal.







Thread