From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: fa42f309477c66b7b508670133d0d72886b99867dcf06b29b5da9221196a534a
Message ID: <199408021526.LAA17483@pipe1.pipeline.com>
Reply To: N/A
UTC Datetime: 1994-08-02 15:27:24 UTC
Raw Date: Tue, 2 Aug 94 08:27:24 PDT
From: John Young <jya@pipeline.com>
Date: Tue, 2 Aug 94 08:27:24 PDT
To: cypherpunks@toad.com
Subject: Steganography (Was Re: What kind of encryption to incorporate?)
Message-ID: <199408021526.LAA17483@pipe1.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Responding to msg by a.brown@nexor.co.uk (Andrew Brown) on Tue,
2 Aug 9:55 AM
>Has anyone got any more ideas?
Andy:
Some features of CAD programs such as AutoCad may be useful for
concealment.
Want to discuss here or by e-mail?
Caution: I'm crypto impaired, but quite devious advantaged.
John
Return to August 1994
Return to “John Young <jya@pipeline.com>”