<nettime> "Pirate Utopia," FEED, February 20, 2001
Sampo Syreeni
decoy at iki.fi
Mon Sep 24 16:37:17 EDT 2001
On Mon, 24 Sep 2001, Ted Lemon wrote:
>This presumes that people who use steganography in the real world right
>now are similar in their password security habits to the general computer
>user population.
It also presumes that people use the precise same steganographic algorithm,
I think. I've haven't seen the paper, though -- what's said there about the
issue of multiple stego methods out there?
Sampo Syreeni, aka decoy, mailto:decoy at iki.fi, gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
openpgp: 050985C2/025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list