On 1/25/07, Carl Lowenstein <[EMAIL PROTECTED]> wrote:
Isn't this just "security by obscurity" which isn't much security at
all.  It's almost as good as starting your reply with "^begin  ".

One could argue that all encryption is.  Instead of "which of these
two billion different password combinations encrypts this data", it's
"which of these umpteen files has a another file or words hidden in
it, and at which umpteenth byte, and (maybe) what's the password to
open it?".

I think the benefit of regular encryption style "security through
obscurity" is that it's simpler and therefore more understandable, and
mathematically analyzable through more straightforward means.

Now it's got me wondering just how many different combinations of
hiding one could accomplish.  If you get, say, 20 sizable Files That
Can Have Embedded Data a day...  and sizable equals...  Ah, forget it.

-todd


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to