At 07:15 AM 3/31/03 +0200, Thomas Shaddack wrote:
For very-low-bandwidth data transfers hidden in wideband streams, we could
maybe use timing of packets. Wouldn't work with more congested networks,
and would need some kind of REALLY heavy-duty error correction, but could
be rather difficult to
As for the how, one wonders some form of fake-stego can't be
incorporated somehow into non-stego programs, such as zip/compression
utilities, file-sharing and so on.
For very-low-bandwidth data transfers hidden in wideband streams, we could
maybe use timing of packets. Wouldn't work with more
Mentions of anonymous remailers are now almost commonplace. Looks like
stego is catching up.
Implications for attempted bans on these tools, or enhanced
sentencing, are left to your imagination.
Steganalysis is going to be a big thing.
Possible countermeasure is embedding a steganographed
Gotta give this thought a great big ditto. I've believed for a long time now
that the real reason the fedz have tried to scare the public from using
heavy crypto is for precisely this reason...a lot can be determined merely
by the presence and form of crypto used. I am in fact starting to
The S-Tools stego package had an appearance in tonight's Law and
Order--Special Victims Unit, with a suspected child pornographer
hiding images of children in they could be images of
anything--sunspots, whatever.
Stego...it's mainly used by spies.
Even a mention of the etymology of