1995-07-13 - Re: def’n of “computer network”

Header Data

From: hoz@univel.telescan.com (rick hoselton)
To: cypherpunks@toad.com
Message Hash: 43c36c69275b3e3aa61bee54d7ea7959f61d75ea2464ddb815a89c6f5216571d
Message ID: <9507132338.AA07522@toad.com>
Reply To: N/A
UTC Datetime: 1995-07-13 23:38:30 UTC
Raw Date: Thu, 13 Jul 95 16:38:30 PDT

Raw message

From: hoz@univel.telescan.com (rick hoselton)
Date: Thu, 13 Jul 95 16:38:30 PDT
To: cypherpunks@toad.com
Subject: Re: def'n of "computer network"
Message-ID: <9507132338.AA07522@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


imsi.com!perry ("Perry E. Metzger") writes:


>My opinion is that stegonography "standards" are useless. 
> Anyone can
>try unpeeling the GIFs and see if something interesting shows up
>inside. That means that the only useful stego suffers from the defect
>that symmetric key cryptography suffers from -- you have to have made
>serious pre-arrangements with the counterparty.

Perry, I don't understand.  If the least significant bits in my gif file
follow all the "known statistical distributions", how can anyone know 
whether they are "just noise" or are an encrypted message, (asymmetric or 
symmetric, either one) unless they have the key?  Why can't there be public 
key steganography?  Perhaps existing tools are inadequate, but are they
impossible?  
Rick F. Hoselton  (who doesn't claim to present opinions for others)





Thread