Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-24 Thread Ted Lemon
Actually, dictionary attacks reveal about sixty percent of passwords, so for every six passwords you find on a dictionary attack, you can infer ten actual stegotexts times the ratio between your analyzed and discovered (possibly-false) positives. This presumes that people who use

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-24 Thread Ben Laurie
Grant Bayley wrote: --- begin forwarded text Status: U From: Julian Dibbell [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: nettime Pirate Utopia, FEED, February 20, 2001 Date: Thu, 20 Sep 2001 08:37:20 -0500 Sender: [EMAIL PROTECTED] Reply-To: Julian Dibbell [EMAIL

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-22 Thread Adam Back
On Fri, Sep 21, 2001 at 06:19:43PM +0100, Adam Back wrote: My point was higher level. These systems are either already broken or fragile and very lightly peer reviewed. There aren't many people building and breaking them. To elaborate on this slightly. There are inherent reasons why

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-22 Thread jamesd
-- On 22 Sep 2001, at 16:11, Adam Back wrote: There will be a never-ended stream of more refined and accurate models of the signal itself, and biases in the equipment that collects the signal. So there will be always a risk that the detecter gets the edge by marginally more accurately

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-21 Thread Ariel Waissbein
Hi to you all! A word on this thread. I think you are giving missleading assertions. It's just a subtlety I'd like to mention. Perhaps you should simply notice that getting a one-use-only webmail email account and sending the message the bird is flying home or any James Bondish message like

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-21 Thread Adam Back
My point was higher level. These systems are either already broken or fragile and very lightly peer reviewed. There aren't many people building and breaking them. I did read the papers; my summary is the above, and from that I surmise it would not be wise for a terrorist to use current

nettime Pirate Utopia, FEED, February 20, 2001

2001-09-20 Thread R. A. Hettinga
--- begin forwarded text Status: U From: Julian Dibbell [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: nettime Pirate Utopia, FEED, February 20, 2001 Date: Thu, 20 Sep 2001 08:37:20 -0500 Sender: [EMAIL PROTECTED] Reply-To: Julian Dibbell [EMAIL PROTECTED] Key concepts: steganography

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-20 Thread Grant Bayley
--- begin forwarded text Status: U From: Julian Dibbell [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: nettime Pirate Utopia, FEED, February 20, 2001 Date: Thu, 20 Sep 2001 08:37:20 -0500 Sender: [EMAIL PROTECTED] Reply-To: Julian Dibbell [EMAIL PROTECTED] Key concepts

Re: nettime Pirate Utopia, FEED, February 20, 2001

2001-09-20 Thread Adam Back
Also it's interesting to note that it appears from Niels Provos and Peter Honeymans paper that none of the currently available stego encoding programs are secure. They have broken them all (at least I recognise the main stego programs available in their list of systems their tools can attack),