[cryptography] who cares about advanced persistent tracking?
From the strange bedfellows department, who cares about us all being tracked everywhere? The Chinese, that's who ;) http://www.securityweek.com/apple-iphone-threat-national-security-chinese-media BEIJING - Chinese state broadcaster CCTV has accused US technology giant Apple of threatening national security through its iPhone's ability to track and time-stamp a user's location. The frequent locations function, which can be switched on or off by users, could be used to gather extremely sensitive data, and even state secrets, said Ma Ding, director of the Institute for Security of the Internet at People's Public Security University in Beijing. The tool gathers information about the areas a user visits most often, partly to improve travel advice. In an interview broadcast Friday, Ma gave the example of a journalist being tracked by the software as a demonstration of her fears over privacy. One can deduce places he visited, the sites where he conducted interviews, and you can even see the topics which he is working on: political and economic, she said. ... ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] [Cryptography] Steganography and bringing encryption to a piece of paper
On Fri, Jul 18, 2014 at 7:45 PM, Sampo Syreeni de...@iki.fi wrote: So what *is* it with you people? Can't you see that steganography really starts and ends with information and coding theory, unlike cryptography? Its bounds really necessarily and from the start have to do with noise and uncertainty, whereas crypto protocols only deal with clean data and computational complexity (eventually, preferably, proven-to-be-hard one-way-functions). Steganography really is its own, separate field, eventhough it shares most of the randomness, signal processing, complexity and whatnot, framework, with current crypto proper. You're quite right. If anyone is interested in some of the more information theoretical approaches to steganography, I have several chapters about it in *Disappearing Cryptography. *Pretty rudimentary, of course, but it might be a help. http://www.amazon.com/gp/product/0123744792/ref=as_li_tl?ie=UTF8camp=1789creative=390957creativeASIN=0123744792linkCode=as2tag=myhomepage0bclinkId=LCZPZBSBFE2HXQ77 ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] [Cryptography] Steganography and bringing encryption to a piece of paper
On Sat, 19 Jul 2014 02:45:05 +0300 (EEST) Sampo Syreeni de...@iki.fi wrote: So what *is* it with you people? Can't you see that steganography really starts and ends with information and coding theory, unlike cryptography? Its bounds really necessarily and from the start have to do with noise and uncertainty, whereas crypto protocols only deal with clean data and computational complexity (eventually, preferably, proven-to-be-hard one-way-functions). Steganography really is its own, separate field, eventhough it shares most of the randomness, signal processing, complexity and whatnot, framework, with current crypto proper. (Especially the symmetrical and streaming kind, BTW, which might be a problem aand a subject for further study.) The many crappy steganography toys have come to define the term, colloquially, even among those who should know better. Information theoretically secure steganography schemes exist, and have been described, along with proofs, in detail by scientists. In fact, such schemes are in use today, in modern radar systems, but they are called low probability of intercept not steganography. Shannon had even proposed that symbols be encoded as Gaussian noise (the principle of LPI), but his goal was maximizing transmission rate, not hiding the transmission. The latter is just a bonus. Unfortunately, the meme steganography is LSB encoding continues. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography