1993-11-18 - Re: Encryption: A Testimonial

Header Data

From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
To: cypherpunks@toad.com
Message Hash: 90e66d93c62b6586a2fe109b2c4ef410198f7b8c328c512bbab357117d62c8ff
Message ID: <wgukgVm00awJ8HTkgw@andrew.cmu.edu>
Reply To: <199311180424.UAA16898@mail.netcom.com>
UTC Datetime: 1993-11-18 05:44:29 UTC
Raw Date: Wed, 17 Nov 93 21:44:29 PST

Raw message

From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
Date: Wed, 17 Nov 93 21:44:29 PST
To: cypherpunks@toad.com
Subject: Re: Encryption: A Testimonial
In-Reply-To: <199311180424.UAA16898@mail.netcom.com>
Message-ID: <wgukgVm00awJ8HTkgw@andrew.cmu.edu>
MIME-Version: 1.0
Content-Type: text/plain


tcmay@netcom.com (Timothy C. May) wrote:

> Also an argument for using stegonography, to obscure the fact that one
> has encrypted files. Companies or universities may have simplistic
> policies banning encrypion as a matter of policy, for various and
> sundry reasons, and may snoop through networked machines looking
> for encrypted files (high entropy, characteristic file types, etc.).
>
> Packing those sensitive resumes and job applications in an innocent
> photo of the dean may be a good idea.

Actually, you could fool a lot of people by creating a hidden disk
partition.  Nobody would know there was anything hidden unless they did
a detailed sector-scan of the disk.  Is there any good software for
doing this with modern operating systems?
It used to be real easy to do stuff like that in the old days when OS
were simple and hackable.  Once someone showed me a trick on an old,
old, Apple DOS; you could change one byte in RAM, and viola, a totally
new directory appeared on the disk!  Pretty cute trick.  Too bad things
ain't that simple anymore. :)





Thread