RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Alan
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: At 02:07 PM 2/1/2005, Tyler Durden wrote: Counter-stego detection. Seems to me a main tool will be a 2-D Fourier analysis...Stego will certainly have a certain thumbprint, depending on the algorithm. Are there certain images that

[ISN] REVIEW: Modern Cryptography: Theory and Practice, Wenbo Mao

2005-02-02 Thread R.A. Hettinga
--- begin forwarded text Date: Tue, 1 Feb 2005 03:05:23 -0600 (CST) From: InfoSec News [EMAIL PROTECTED] To: isn@attrition.org Subject: [ISN] REVIEW: Modern Cryptography: Theory and Practice, Wenbo Mao Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Forwarded from: Rob, grandpa of Ryan,

[ISN] Call for Papers - PHRACK #63

2005-02-02 Thread R.A. Hettinga
--- begin forwarded text Date: Mon, 24 Jan 2005 03:39:32 -0600 (CST) From: InfoSec News [EMAIL PROTECTED] To: isn@attrition.org Subject: [ISN] Call for Papers - PHRACK #63 Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Forwarded from: [EMAIL PROTECTED]

[i2p] weekly status notes [feb 1] (fwd from jrandom@i2p.net)

2005-02-02 Thread Eugen Leitl
- Forwarded message from jrandom [EMAIL PROTECTED] - From: jrandom [EMAIL PROTECTED] Date: Tue, 1 Feb 2005 13:03:02 -0800 To: [EMAIL PROTECTED] Subject: [i2p] weekly status notes [feb 1] -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi y'all, weekly status time * Index 1) 0.5 status 2)

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Eugen Leitl
On Tue, Feb 01, 2005 at 11:21:31PM -0800, Steve Schear wrote: At 02:07 PM 2/1/2005, Tyler Durden wrote: Counter-stego detection. Seems to me a main tool will be a 2-D Fourier analysis...Stego will certainly have a certain thumbprint, depending on the algorithm. Are Stego doesn't need to

Update Your Windows Serial V5FY9P

2005-02-02 Thread FHYE8S_XP_Accounts
Below is the result of your feedback form. It was submitted by ([EMAIL PROTECTED]) on Wednesday, February 2, 2005 at 07:10:58 --- : Hello Microsoft user, We here at Microsoft would like you to still receive your normal

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Sarad AV
hi, Tyler Durden wrote: Are there certain images that can hide stego more effectively? IN other words, these images should have a lot of spectral energy in the same frequency bands where Stego would normally show. Yes, there should be a lot of noise in the image, some way or the other. If you

Re: [i2p] weekly status notes [feb 1] (fwd from jrandom@i2p.net)

2005-02-02 Thread Steve Thompson
--- Eugen Leitl [EMAIL PROTECTED] wrote: - Forwarded message from jrandom [EMAIL PROTECTED] - From: jrandom [EMAIL PROTECTED] Date: Tue, 1 Feb 2005 13:03:02 -0800 To: [EMAIL PROTECTED] Subject: [i2p] weekly status notes [feb 1] [snip] Thats all I have for the moment (good thing

Cost and privacy concerns stall PAYD car insurance

2005-02-02 Thread R.A. Hettinga
http://www.theregister.co.uk/2005/02/01/car_insurace_payd/print.html The Register Biting the hand that feeds IT The Register » Personal » Original URL: http://www.theregister.co.uk/2005/02/01/car_insurace_payd/ Cost and privacy concerns stall PAYD car insurance By Lucy Sherriff

MSN Belgium to use eID cards for online checking

2005-02-02 Thread R.A. Hettinga
http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/print.html The Register Biting the hand that feeds IT The Register » Internet and Law » Digital Rights/Digital Wrongs » Original URL: http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/ MSN Belgium to use eID cards for

Peppercoin Small Payments Processing Suite Available to First Data Channels

2005-02-02 Thread R.A. Hettinga
http://biz.yahoo.com/prnews/050202/new005_1.html Yahoo! Finance Press Release Source: Peppercoin Peppercoin Small Payments Processing Suite Available to First Data Channels Wednesday February 2, 9:03 am ET Small Transaction Suite Certified for Sale Through Processor's Merchant Acquiring

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Steve Thompson
--- Trei, Peter [EMAIL PROTECTED] wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Well we all know that having complete control over one's own computer is far

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Eugen Leitl
On Wed, Feb 02, 2005 at 12:45:58PM -0500, Steve Thompson wrote: Well we all know that having complete control over one's own computer is far too dangerous. Obviously, it would be best if computers, operating systems, and application software had proprietary back-doors that would enable the

Re: Sound filtering software. (fwd from kaiser@emjay.net)

2005-02-02 Thread Eugen Leitl
- Forwarded message from Michael Johnson [EMAIL PROTECTED] - From: Michael Johnson [EMAIL PROTECTED] Date: Wed, 2 Feb 2005 13:55:59 -0500 To: [EMAIL PROTECTED] Subject: Re: Sound filtering software. X-Mailer: Apple Mail (2.619.2) On Feb 2, 2005, at 12:01 AM, Joseph Chamberlain, DDS

Jim Bell WMD Threat

2005-02-02 Thread John Young
The FBI continues to claim Jim Bell is a WMD threat despite having no case against him except in the media, but that conforms to current FBI/DHS policy of fictionalizing homeland threats. http://www.edgewood.army.mil/downloads/bwirp/mdc_appendix_b02.pdf See page 16. This document was initially

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Trei, Peter
Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Peter Trei Tyler Durden ANyone familiar with computer architectures and chips able to answer this question: That

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread J.A. Terranson
On Wed, 2 Feb 2005, Alan wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out. Yeah, but it doesn't make for great story copy or funding proposals ;-) -- Yours, J.A. Terranson [EMAIL PROTECTED]

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Erwann ABALEA
On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full control over your PC, even if this one is

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread AW
Just herd of this http://www.spammimic.com/ AW Alan wrote: On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out.

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Ian G
Erwann ABALEA wrote: On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full control over your

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Dan Kaminsky
Uh, you *really* have no idea how much the black hat community is looking forward to TCPA. For example, Office is going to have core components running inside a protected environment totally immune to antivirus. Since these components are going to be managing cryptographic operations, the

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Peter Gutmann
Tyler Durden [EMAIL PROTECTED] writes: That chip...is it likely to be an ASIC or is there already such a thing as a security network processor? (ie, a cheaper network processor that only handles security apps, etc...) Or could it be an FPGA? Neither. Currently they've typically been

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Jay Sulzberger
On Wed, 2 Feb 2005, Erwann ABALEA wrote: On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Sarad AV
hi, Tyler Durden wrote: Are there certain images that can hide stego more effectively? IN other words, these images should have a lot of spectral energy in the same frequency bands where Stego would normally show. Yes, there should be a lot of noise in the image, some way or the other. If you

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Eugen Leitl
On Tue, Feb 01, 2005 at 11:21:31PM -0800, Steve Schear wrote: At 02:07 PM 2/1/2005, Tyler Durden wrote: Counter-stego detection. Seems to me a main tool will be a 2-D Fourier analysis...Stego will certainly have a certain thumbprint, depending on the algorithm. Are Stego doesn't need to

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Steve Thompson
--- Trei, Peter [EMAIL PROTECTED] wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Well we all know that having complete control over one's own computer is far

Re: [i2p] weekly status notes [feb 1] (fwd from jrandom@i2p.net)

2005-02-02 Thread Steve Thompson
--- Eugen Leitl [EMAIL PROTECTED] wrote: - Forwarded message from jrandom [EMAIL PROTECTED] - From: jrandom [EMAIL PROTECTED] Date: Tue, 1 Feb 2005 13:03:02 -0800 To: [EMAIL PROTECTED] Subject: [i2p] weekly status notes [feb 1] [snip] Thats all I have for the moment (good thing

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Eugen Leitl
On Wed, Feb 02, 2005 at 12:45:58PM -0500, Steve Thompson wrote: Well we all know that having complete control over one's own computer is far too dangerous. Obviously, it would be best if computers, operating systems, and application software had proprietary back-doors that would enable the

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread J.A. Terranson
On Wed, 2 Feb 2005, Alan wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out. Yeah, but it doesn't make for great story copy or funding proposals ;-) -- Yours, J.A. Terranson [EMAIL PROTECTED]

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Alan
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: At 02:07 PM 2/1/2005, Tyler Durden wrote: Counter-stego detection. Seems to me a main tool will be a 2-D Fourier analysis...Stego will certainly have a certain thumbprint, depending on the algorithm. Are there certain images that

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Trei, Peter
Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Peter Trei Tyler Durden ANyone familiar with computer architectures and chips able to answer this question: That

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Steve Schear
At 02:07 PM 2/1/2005, Tyler Durden wrote: Counter-stego detection. Seems to me a main tool will be a 2-D Fourier analysis...Stego will certainly have a certain thumbprint, depending on the algorithm. Are there certain images that can hide stego more effectively? IN other words, these images

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Erwann ABALEA
On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full control over your PC, even if this one is

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread AW
Just herd of this http://www.spammimic.com/ AW Alan wrote: On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out.