On 1/25/07, Carl Lowenstein <[EMAIL PROTECTED]> wrote:
Isn't this just "security by obscurity" which isn't much security at all. It's almost as good as starting your reply with "^begin ".
One could argue that all encryption is. Instead of "which of these two billion different password combinations encrypts this data", it's "which of these umpteen files has a another file or words hidden in it, and at which umpteenth byte, and (maybe) what's the password to open it?". I think the benefit of regular encryption style "security through obscurity" is that it's simpler and therefore more understandable, and mathematically analyzable through more straightforward means. Now it's got me wondering just how many different combinations of hiding one could accomplish. If you get, say, 20 sizable Files That Can Have Embedded Data a day... and sizable equals... Ah, forget it. -todd -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
