1996-03-06 - No Subject

Header Data

From: owner-cypherpunks@toad.com
To: N/A
Message Hash: 1026ebe13794b46937d2a758ca10bfcf85696f41f5b2ba8d14b3298e3325590d
Message ID: <QQafwt14576.199603061653@relay3.UU.NET>
Reply To: N/A
UTC Datetime: 1996-03-06 17:09:44 UTC
Raw Date: Thu, 7 Mar 1996 01:09:44 +0800

Raw message

From: owner-cypherpunks@toad.com
Date: Thu, 7 Mar 1996 01:09:44 +0800
Subject: No Subject
Message-ID: <QQafwt14576.199603061653@relay3.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 6 Mar 1996, Nelson Minar wrote:

> The thing that bothers me about existing steganography code I've seen
> is that it all uses uncommon communication channels to hide data. For
> instance, the "hide data in a picture" programs: useful, up to a
> point, but how often do I send pictures to other people? I think to be
> effective, methods need to be employed that exploit existing, well
> used communication channels.

Then he sez:

> So here's one idea I've had as a place to hide a channel: network
> video, in particular CU-SeeMe video streams. CU-SeeMe is a lowtech

I think it likely that people will be sending GIFs and JPEGs to each 
other far more often than video.  Video is far more an "uncommon 
communications channel" than is a uuencoded picture.
--
Ed Carp, N7EKG    			Ed.Carp@linux.org, ecarp@netcom.com
					214/993-3935 voicemail/digital pager
					800/558-3408 SkyPager
Finger ecarp@netcom.com for PGP 2.5 public key		an88744@anon.penet.fi

"Past the wounds of childhood, past the fallen dreams and the broken families,
through the hurt and the loss and the agony only the night ever hears, is a
waiting soul.  Patient, permanent, abundant, it opens its infinite heart and
asks only one thing of you ... 'Remember who it is you really are.'"

                    -- "Losing Your Mind", Karen Alexander and Rick Boyes

The mark of a good conspiracy theory is its untestability.
		    -- Andrew Spring






Thread