On 1/25/07, Stewart Stremler <[EMAIL PROTECTED]> wrote:
begin quoting Bob La Quey as of Thu, Jan 25, 2007 at 11:25:11AM -0800:
[snip]
> I simply tossed out a page that I found amusing. Noone
> doing serious steganography would do this. First of all
> it is trivial to determine that the image file has extra
> data at the end, which is a dead give away to the fact
> that something is fishy.
So... use the standard (hard to detect) steganography tools
to embed your important information in the image file, and then
put some mildly incriminating evidence in the zip file, and
append the zip file to the image file.
--
Encrypt, then use steganography, then use misdirection.
Stewart Stremler
Yeh one of the things that makes stega fun is the opportunity
for creativity. Put it together with a one time pad and you have
a "Pretty Good System." And the Internet certainly gives you a
large hiding place.
Of course that simply changes the problem. How do you
exchange the one time pad? Maybe you could just pcik up
a phone and point into this http://hcoop.net/~ntk/random/digits.txt
Chuckle, "42"
BobLQ
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list