1994-03-07 - Re: Standard for SteGAnography

Header Data

From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
To: cypherpunks list <cypherpunks@toad.com>
Message Hash: 7a888b9bd3d43ba61b35651fc798c45dbe9ba2e3e736758ab91fe1a8f028fc79
Message ID: <9403070903.AA24454@toad.com>
Reply To: <Pine.3.89.9403070307.D1315-0100000@delbruck.pharm.sunysb.edu>
UTC Datetime: 1994-03-07 09:03:20 UTC
Raw Date: Mon, 7 Mar 94 01:03:20 PST

Raw message

From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
Date: Mon, 7 Mar 94 01:03:20 PST
To: cypherpunks list <cypherpunks@toad.com>
Subject: Re: Standard for SteGAnography
In-Reply-To: <Pine.3.89.9403070307.D1315-0100000@delbruck.pharm.sunysb.edu>
Message-ID: <9403070903.AA24454@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


> My original response was concerning an algorithm "good enough to withstand 
> an opponent who has full documentation of your algorithms and methods lots 
> of funds, and everything except your keys."

That's what they have; what can they *do*?  As I've been trying to
get across, that is not a full specification of capabilities.
Enough.

   Eli   ebrandt@hmc.edu






Thread