1994-02-25 - Re: WE WANT SELF DECRYPTING STENOGRAPHY NOW!

Header Data

From: tomh@bambi.ccs.fau.edu (Tom Holroyd)
To: cypherpunks@toad.com
Message Hash: e3eaf00ed1618e0dc9a99c853e6b8fa2151364de6872d4db1799a4342daed05a
Message ID: <9402250339.AA14924@bambi.ccs.fau.edu>
Reply To: N/A
UTC Datetime: 1994-02-25 03:41:25 UTC
Raw Date: Thu, 24 Feb 94 19:41:25 PST

Raw message

From: tomh@bambi.ccs.fau.edu (Tom Holroyd)
Date: Thu, 24 Feb 94 19:41:25 PST
To: cypherpunks@toad.com
Subject: Re: WE WANT SELF DECRYPTING STENOGRAPHY NOW!
Message-ID: <9402250339.AA14924@bambi.ccs.fau.edu>
MIME-Version: 1.0
Content-Type: text/plain


Any software for hiding data in fractals would have the problem that
people would eventually learn to recognize the type of fractal.  Thus
when the FBI digs through your PC, they'd find the fractals, and recognize
them as data carriers.	Hiding data in arbitrary .jpg files would solve
this problem, but even so, if the FBI knows there is software for
hiding data in the low bits of .jpg files, they'd run it on all your
pictures as a matter of course.  Naturally you'll have encrypted your
file, but you may as well have left it on the disk as is.

a) What's stenography?
b) What's stegography?
c) There's nothing self-decrypting about a .jpg file.






Thread