On Wed, Oct 31, 2001 at 05:18:37PM +0530, Udhay Shankar N wrote:
At 04:32 PM 10/30/01 -0500, Trei, Peter wrote:
identifying the target site. Of course, none of this is shielded from the
proxy owner.
I tried chaining 3 web proxies once, but it was unusably slow and kept
timing out. Any
Another sensationalist article in the NYT about the pervasiveness of
steganography, with yet another lack of any evaluatable information.
http://www.nytimes.com/2001/10/30/science/physical/30STEG.html?pagewanted=print
In summary, evidence for stego in this article is:
Some unnamed French
On Tue, 30 Oct 2001, Nelson Minar wrote:
What's so frustrating about this is that it is quite possible that
high quality stego is being used out there; how would we know?
That's highly doubtful. We cypherpunks are on the forefront of practical
crypto applications, and what we've got is still
- Original Message -
From: Bram Cohen [EMAIL PROTECTED]
To: Nelson Minar [EMAIL PROTECTED]
Cc: Crypto List [EMAIL PROTECTED]
Sent: Wednesday, October 31, 2001 1:36 AM
Subject: Re: Yet more stego scare in the New York Times
[...]
hotmail/yahoo/hushmail/etc. accounts - these are used