On Apr 26, 2011, at 10:56 AM, Stephen Conrad wrote: >> >> >> And then we throw THIS monkey wrench into the cogworks... > > > http://www.theregister.co.uk/2011/04/26/cluster_based_steganography/
Not really applicable to stolen bandwidth, unless they're stealing your drive space as well to store their stuff. This is a straightforward application of steganography, simply applied to a somewhat larger structure than the usual one which is a single file. Also this is a Reg article, an organization not well known for getting their facts straight or keeping their politics confined to the editorial side. Reading the article shows that there are significant limitations to the technique. -- Bruce Johnson University of Arizona College of Pharmacy Information Technology Group Institutions do not have opinions, merely customs -- You received this message because you are a member of G-Group, a group for those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs. The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette guide is at http://www.lowendmac.com/lists/netiquette.shtml To post to this group, send email to g3-5-list@googlegroups.com For more options, visit this group at http://groups.google.com/group/g3-5-list