On Apr 26, 2011, at 10:56 AM, Stephen Conrad wrote:

>> 
>> 
>> And then we throw THIS monkey wrench into the cogworks...
> 
> 
> http://www.theregister.co.uk/2011/04/26/cluster_based_steganography/

Not really applicable to stolen bandwidth, unless they're stealing your drive 
space as well to store their stuff. This is a straightforward application of 
steganography, simply applied to a somewhat larger structure than the usual one 
which is a single file.

Also this is a Reg article, an organization not well known for getting their 
facts straight or keeping their politics confined to the editorial side.

Reading the article shows that there are significant limitations to the 
technique.

-- 
Bruce Johnson
University of Arizona
College of Pharmacy
Information Technology Group

Institutions do not have opinions, merely customs


-- 
You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to g3-5-list@googlegroups.com
For more options, visit this group at http://groups.google.com/group/g3-5-list

Reply via email to