On Mon, 24 Sep 2001, Ted Lemon wrote:

>This presumes that people who use steganography in the real world right
>now are similar in their password security habits to the general computer
>user population.

It also presumes that people use the precise same steganographic algorithm,
I think. I've haven't seen the paper, though -- what's said there about the
issue of multiple stego methods out there?

Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
openpgp: 050985C2/025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to