funsec mailing list archives

Re: [privacy] privacy Digest, Vol 2, Issue 44


From: "Fergie" <fergdawg () netzero net>
Date: Fri, 26 May 2006 01:23:19 GMT

Completely agreed.

I believe strongly that, if I wish my communications to be
truly private, I have every right to do so, and will exercise
the right whenever I see fit.

The only people who might suggest that I have something to
hide which may inidict me as "criminal" had better check their
own closets -- my privilege to be secure in my communications in
no way suggest that a criminal act is being hidden. Only oppressive,
and failing dictates would think so, in my opinion.

Cheers,

- ferg

-- Mark Carey-Smith <m.careysmith () student qut edu au> wrote:

It certainly is an interesting topic. I've been looking at this recently as a method that activists and dissidents 
could use to exchange sensitive information "in plain sight". It could be very useful inside repressive regimes with 
extensive censorship and surveillance.

Hacktivismo's Camera/Shy is one such product http://sourceforge.net/projects/camerashy/

Interesting, though not surprising, that the language in the posted piece is so negative towards steganography. It's 
all the usual suspects; organised crime, child pornography and terrorism. 

Of course this particular technology is neutral but at least Hacktivismo have their innovative 'Hacktivismo 
Enhanced-Source Software License Agreement' to attempt to ensure that their software isn't used to degrade human 
rights. Obviously most human rights abusers won't take any notice of it but it's a fine document all the same 
(http://www.hacktivismo.com/about/hessla.php).

---- Original message ----
Date: Wed, 24 May 2006 18:41:06 GMT
From: "Fergie" <fergdawg () netzero net>
Subject: [privacy] Stego Tech: Researchers Use Statistical Modeling to
      Detect Stego-Embed      ded Data
[snip]

Keeping computer files private requires only the use of a simple encryption program. For criminals or terrorists 
wanting to conceal their activities, however, attaching an encrypted file to an e-mail message is sure to raise 
suspicion with law enforcement or government agents monitoring e-mail traffic.
[snip]
The payload files can be almost anything from illegal financial transactions and the proverbial off-shore account 
information to sleeper cell communications or child pornography.
[snip]

Mark Carey-Smith
PhD Candidate
Faculty of Information Technology
Queensland University of Technology

[snip]

--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg () netzero net or fergdawg () sbcglobal net
 ferg's tech blog: http://fergdawg.blogspot.com/

_______________________________________________
privacy mailing list
privacy () whitestar linuxbox org
http://www.whitestar.linuxbox.org/mailman/listinfo/privacy


Current thread: