Source discrimination.

2001-12-30 Thread tpurdy
My search is not directly related to cryptography, except perhaps, as part of the stegonograph y threads: Does anyone know of a source package that can discriminate vocal/ambient noise sources from musical/instrumental sources? Ie, instruments vs voice? I'm aware of various canned bandpass

Re: Stegdetect 0.4 released and results from USENET search available

2001-12-30 Thread Dan Geer
I download all of alt.anonymous.messages from the same news server that large numbers of people post and download child porn on. It might be that child porn posted to these lists is the most attractive vehicle as it is illegal everywhere, it will not be downloaded at random, those who do

Re: Source discrimination.

2001-12-30 Thread Gregory Hicks
From: [EMAIL PROTECTED] Date: Sat, 29 Dec 2001 23:44:08 -0500 My search is not directly related to cryptography, except perhaps, as part of the stegonograph y threads: Does anyone know of a source package that can discriminate vocal/ambient noise sources from musical/instrumental

RE: Source discrimination.

2001-12-30 Thread Ben Cox
You might have some luck with ProSoniq's sonicWORX Studio, which I'm pretty certain can do this. -- Ben -Original Message- From: [EMAIL PROTECTED] [mailto:owner- [EMAIL PROTECTED]] On Behalf Of [EMAIL PROTECTED] Sent: Saturday, December 29, 2001 11:44 PM To: [EMAIL PROTECTED]

RE: Source discrimination.

2001-12-30 Thread Ben Cox
Oops -- sorry, I forgot to send the link; they are at www.prosoniq.de. -- Ben -Original Message- From: [EMAIL PROTECTED] [mailto:owner- [EMAIL PROTECTED]] On Behalf Of Ben Cox Sent: Sunday, December 30, 2001 2:07 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Source

Re: Steganography covert communications - Between Silk and Cyanide

2001-12-30 Thread John Gilmore
generally, imagine you are a consultant to some nefarious organization and think about what it would take to convince them that the method you propose is safe, capable of being taught to their covert agents, and tolerant of the inevitable slip ups in the field (and remember their

Re: CFP: PKI research workshop

2001-12-30 Thread lynn . wheeler
another aspect that overlaps PKIs and quality is the difference between application code and service code turning an application into a service can be hard possibly writing 4-10 times as much code as in the base application infrastructure and very high-quality code dealing

Re: CFP: PKI research workshop

2001-12-30 Thread lynn . wheeler
somewhat as an aside the gift cards (and other flavors) that you see at large percentage of retail check-out counters in the US are effectively digital cash ... although the current incarnation results in a different card at every retailer. however, they are online, magstripe-based digital

RE: CFP: PKI research workshop

2001-12-30 Thread Peter Gutmann
Arnold G. Reinhold [EMAIL PROTECTED] writes: The EWR monorail had been shut down for the better part of a year to correct a pesky track corrosion problem (it's hard to get all the bugs out of a system that is not widely used). Thus making it a perfect analogy for PKI [0]. Peter. [0] Before

Re: Steganography covert communications - Between Silk and Cyanide

2001-12-30 Thread David Honig
At 02:59 PM 12/30/01 -0800, John Gilmore wrote: Along these lines I can't help but recommend reading one of the best crypto books of the last few years: Between Silk and Cyanide Leo Marks, 1999 This wonderful, funny, serious, and readable book was written by the chief