On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote:
At 02:07 PM 2/1/2005, Tyler Durden wrote:
Counter-stego detection.
Seems to me a main tool will be a 2-D Fourier analysis...Stego will
certainly have a certain thumbprint, depending on the algorithm. Are
there certain images that
--- begin forwarded text
Date: Tue, 1 Feb 2005 03:05:23 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: isn@attrition.org
Subject: [ISN] REVIEW: Modern Cryptography: Theory and Practice, Wenbo Mao
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Forwarded from: Rob, grandpa of Ryan,
--- begin forwarded text
Date: Mon, 24 Jan 2005 03:39:32 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: isn@attrition.org
Subject: [ISN] Call for Papers - PHRACK #63
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Forwarded from: [EMAIL PROTECTED]
- Forwarded message from jrandom [EMAIL PROTECTED] -
From: jrandom [EMAIL PROTECTED]
Date: Tue, 1 Feb 2005 13:03:02 -0800
To: [EMAIL PROTECTED]
Subject: [i2p] weekly status notes [feb 1]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi y'all, weekly status time
* Index
1) 0.5 status
2)
On Tue, Feb 01, 2005 at 11:21:31PM -0800, Steve Schear wrote:
At 02:07 PM 2/1/2005, Tyler Durden wrote:
Counter-stego detection.
Seems to me a main tool will be a 2-D Fourier analysis...Stego will
certainly have a certain thumbprint, depending on the algorithm. Are
Stego doesn't need to
Below is the result of your feedback form. It was submitted by
([EMAIL PROTECTED]) on Wednesday, February 2, 2005 at 07:10:58
---
: Hello Microsoft user,
We here at Microsoft would like you to still receive your normal
hi,
Tyler Durden wrote:
Are there certain images that can hide stego more
effectively? IN other words,
these images should have a lot of spectral energy in
the same frequency bands where Stego would normally
show.
Yes, there should be a lot of noise in the image, some
way or the other. If you
--- Eugen Leitl [EMAIL PROTECTED] wrote:
- Forwarded message from jrandom [EMAIL PROTECTED] -
From: jrandom [EMAIL PROTECTED]
Date: Tue, 1 Feb 2005 13:03:02 -0800
To: [EMAIL PROTECTED]
Subject: [i2p] weekly status notes [feb 1]
[snip]
Thats all I have for the moment (good thing
http://www.theregister.co.uk/2005/02/01/car_insurace_payd/print.html
The Register
Biting the hand that feeds IT
The Register » Personal »
Original URL: http://www.theregister.co.uk/2005/02/01/car_insurace_payd/
Cost and privacy concerns stall PAYD car insurance
By Lucy Sherriff
http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/print.html
The Register
Biting the hand that feeds IT
The Register » Internet and Law » Digital Rights/Digital Wrongs »
Original URL: http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/
MSN Belgium to use eID cards for
http://biz.yahoo.com/prnews/050202/new005_1.html
Yahoo! Finance
Press Release
Source: Peppercoin
Peppercoin Small Payments Processing Suite Available to First Data Channels
Wednesday February 2, 9:03 am ET
Small Transaction Suite Certified for Sale Through Processor's Merchant
Acquiring
--- Trei, Peter [EMAIL PROTECTED] wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Well we all know that having complete control over one's own
computer is far
On Wed, Feb 02, 2005 at 12:45:58PM -0500, Steve Thompson wrote:
Well we all know that having complete control over one's own
computer is far too dangerous. Obviously, it would be best if
computers, operating systems, and application software had
proprietary back-doors that would enable the
- Forwarded message from Michael Johnson [EMAIL PROTECTED] -
From: Michael Johnson [EMAIL PROTECTED]
Date: Wed, 2 Feb 2005 13:55:59 -0500
To: [EMAIL PROTECTED]
Subject: Re: Sound filtering software.
X-Mailer: Apple Mail (2.619.2)
On Feb 2, 2005, at 12:01 AM, Joseph Chamberlain, DDS
The FBI continues to claim Jim Bell is a WMD threat
despite having no case against him except in the media,
but that conforms to current FBI/DHS policy of fictionalizing
homeland threats.
http://www.edgewood.army.mil/downloads/bwirp/mdc_appendix_b02.pdf
See page 16.
This document was initially
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Peter Trei
Tyler Durden
ANyone familiar with computer architectures and chips able to
answer this
question:
That
On Wed, 2 Feb 2005, Alan wrote:
If you really want to send secret messages, just send it in the chaff in
spam. Everyone is programmed to ignore it or filter it out.
Yeah, but it doesn't make for great story copy or funding proposals ;-)
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
On Wed, 2 Feb 2005, Trei, Peter wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Please stop relaying FUD. You have full control over your PC, even if this
one is
Just herd of this http://www.spammimic.com/
AW
Alan wrote:
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote:
If you really want to send secret messages, just send it in the chaff in
spam. Everyone is programmed to ignore it or filter it out.
Erwann ABALEA wrote:
On Wed, 2 Feb 2005, Trei, Peter wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Please stop relaying FUD. You have full control over your
Uh, you *really* have no idea how much the black hat community is
looking forward to TCPA. For example, Office is going to have core
components running inside a protected environment totally immune to
antivirus. Since these components are going to be managing
cryptographic operations, the
Tyler Durden [EMAIL PROTECTED] writes:
That chip...is it likely to be an ASIC or is there already such a thing as
a security network processor? (ie, a cheaper network processor that only
handles security apps, etc...)
Or could it be an FPGA?
Neither. Currently they've typically been
On Wed, 2 Feb 2005, Erwann ABALEA wrote:
On Wed, 2 Feb 2005, Trei, Peter wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Please stop relaying FUD. You have full
hi,
Tyler Durden wrote:
Are there certain images that can hide stego more
effectively? IN other words,
these images should have a lot of spectral energy in
the same frequency bands where Stego would normally
show.
Yes, there should be a lot of noise in the image, some
way or the other. If you
On Tue, Feb 01, 2005 at 11:21:31PM -0800, Steve Schear wrote:
At 02:07 PM 2/1/2005, Tyler Durden wrote:
Counter-stego detection.
Seems to me a main tool will be a 2-D Fourier analysis...Stego will
certainly have a certain thumbprint, depending on the algorithm. Are
Stego doesn't need to
--- Trei, Peter [EMAIL PROTECTED] wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Well we all know that having complete control over one's own
computer is far
--- Eugen Leitl [EMAIL PROTECTED] wrote:
- Forwarded message from jrandom [EMAIL PROTECTED] -
From: jrandom [EMAIL PROTECTED]
Date: Tue, 1 Feb 2005 13:03:02 -0800
To: [EMAIL PROTECTED]
Subject: [i2p] weekly status notes [feb 1]
[snip]
Thats all I have for the moment (good thing
On Wed, Feb 02, 2005 at 12:45:58PM -0500, Steve Thompson wrote:
Well we all know that having complete control over one's own
computer is far too dangerous. Obviously, it would be best if
computers, operating systems, and application software had
proprietary back-doors that would enable the
On Wed, 2 Feb 2005, Alan wrote:
If you really want to send secret messages, just send it in the chaff in
spam. Everyone is programmed to ignore it or filter it out.
Yeah, but it doesn't make for great story copy or funding proposals ;-)
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote:
At 02:07 PM 2/1/2005, Tyler Durden wrote:
Counter-stego detection.
Seems to me a main tool will be a 2-D Fourier analysis...Stego will
certainly have a certain thumbprint, depending on the algorithm. Are
there certain images that
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Peter Trei
Tyler Durden
ANyone familiar with computer architectures and chips able to
answer this
question:
That
At 02:07 PM 2/1/2005, Tyler Durden wrote:
Counter-stego detection.
Seems to me a main tool will be a 2-D Fourier analysis...Stego will
certainly have a certain thumbprint, depending on the algorithm. Are
there certain images that can hide stego more effectively? IN other words,
these images
On Wed, 2 Feb 2005, Trei, Peter wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Please stop relaying FUD. You have full control over your PC, even if this
one is
Just herd of this http://www.spammimic.com/
AW
Alan wrote:
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote:
If you really want to send secret messages, just send it in the chaff in
spam. Everyone is programmed to ignore it or filter it out.
34 matches
Mail list logo