<nettime> "Pirate Utopia," FEED, February 20, 2001

Sampo Syreeni decoy at iki.fi
Mon Sep 24 16:37:17 EDT 2001


On Mon, 24 Sep 2001, Ted Lemon wrote:

>This presumes that people who use steganography in the real world right
>now are similar in their password security habits to the general computer
>user population.

It also presumes that people use the precise same steganographic algorithm,
I think. I've haven't seen the paper, though -- what's said there about the
issue of multiple stego methods out there?

Sampo Syreeni, aka decoy, mailto:decoy at iki.fi, gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
openpgp: 050985C2/025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list