1996-10-15 - Stego via TCP/IP (was Re: crypto wish list)

Header Data

From: Nelson Minar <nelson@media.mit.edu>
To: cypherpunks@toad.com
Message Hash: 6373995d7c82bb1e61957cea91650e0e041c6b892d2d43b992763a0d60a0438e
Message ID: <cpag23gjc4v.fsf@hattrick.media.mit.edu>
Reply To: <199610142041.VAA00167@server.test.net>
UTC Datetime: 1996-10-15 18:47:45 UTC
Raw Date: Tue, 15 Oct 1996 11:47:45 -0700 (PDT)

Raw message

From: Nelson Minar <nelson@media.mit.edu>
Date: Tue, 15 Oct 1996 11:47:45 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Stego via TCP/IP (was Re: crypto wish list)
In-Reply-To: <199610142041.VAA00167@server.test.net>
Message-ID: <cpag23gjc4v.fsf@hattrick.media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain


What, a discussion of cryptography on the cypherpunks list?

aba@dcs.ex.ac.uk (Adam Back) writes:
>>Where is highly sophisticated stego?
>What are our options?
>- Stego in english text.
>- Stego in audio and graphic file formats
>- Stego in Internet Phone protocols.
>- Stego in Internet video conference formats

What about stego in IP itself? It's been awhile since I've looked, but
aren't there some bits one could subvert in the TCP/IP headers themselves?





Thread