1994-02-08 - Re: STEG: a real-life use for steganography

Header Data

From: Phil Karn <karn@qualcomm.com>
To: hughes@ah.com
Message Hash: f9b94b14a83cae1160fccc53699c0b2757d0273a1e178ed8f4fca0b467da434b
Message ID: <199402080707.XAA24919@servo.qualcomm.com>
Reply To: <9402041840.AA21942@ah.com>
UTC Datetime: 1994-02-08 07:10:43 UTC
Raw Date: Mon, 7 Feb 94 23:10:43 PST

Raw message

From: Phil Karn <karn@qualcomm.com>
Date: Mon, 7 Feb 94 23:10:43 PST
To: hughes@ah.com
Subject: Re: STEG: a real-life use for steganography
In-Reply-To: <9402041840.AA21942@ah.com>
Message-ID: <199402080707.XAA24919@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


The biggest problem I see with your scheme is that it won't remain secret
for very long, and the government will probably just ban all CD imports
as a result. And possession of a CD player or CDs (even "legit" ones)
would be enough to send you off to kamp.

> -- A decryption system to get the data off the CD.

There's a practical problem here. Audio CD players generally provide
no easy way to get the raw bits into a computer (SPDIF interface cards
exist for PCs, but they're rare and expensive). And I haven't yet
figured out how to get a CD-ROM drive to read the raw bits off an
audio CD; I suspect it requires munging the firmware in the drive,
which makes anything you do highly manufacturer specific.

Phil





Thread