funsec mailing list archives
Re: [privacy] privacy Digest, Vol 2, Issue 44
From: "Fergie" <fergdawg () netzero net>
Date: Fri, 26 May 2006 01:23:19 GMT
Completely agreed. I believe strongly that, if I wish my communications to be truly private, I have every right to do so, and will exercise the right whenever I see fit. The only people who might suggest that I have something to hide which may inidict me as "criminal" had better check their own closets -- my privilege to be secure in my communications in no way suggest that a criminal act is being hidden. Only oppressive, and failing dictates would think so, in my opinion. Cheers, - ferg -- Mark Carey-Smith <m.careysmith () student qut edu au> wrote: It certainly is an interesting topic. I've been looking at this recently as a method that activists and dissidents could use to exchange sensitive information "in plain sight". It could be very useful inside repressive regimes with extensive censorship and surveillance. Hacktivismo's Camera/Shy is one such product http://sourceforge.net/projects/camerashy/ Interesting, though not surprising, that the language in the posted piece is so negative towards steganography. It's all the usual suspects; organised crime, child pornography and terrorism. Of course this particular technology is neutral but at least Hacktivismo have their innovative 'Hacktivismo Enhanced-Source Software License Agreement' to attempt to ensure that their software isn't used to degrade human rights. Obviously most human rights abusers won't take any notice of it but it's a fine document all the same (http://www.hacktivismo.com/about/hessla.php). ---- Original message ----
Date: Wed, 24 May 2006 18:41:06 GMT From: "Fergie" <fergdawg () netzero net> Subject: [privacy] Stego Tech: Researchers Use Statistical Modeling to Detect Stego-Embed ded Data [snip] Keeping computer files private requires only the use of a simple encryption program. For criminals or terrorists wanting to conceal their activities, however, attaching an encrypted file to an e-mail message is sure to raise suspicion with law enforcement or government agents monitoring e-mail traffic.
[snip]
The payload files can be almost anything from illegal financial transactions and the proverbial off-shore account information to sleeper cell communications or child pornography. [snip]
Mark Carey-Smith PhD Candidate Faculty of Information Technology Queensland University of Technology [snip] -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg () netzero net or fergdawg () sbcglobal net ferg's tech blog: http://fergdawg.blogspot.com/ _______________________________________________ privacy mailing list privacy () whitestar linuxbox org http://www.whitestar.linuxbox.org/mailman/listinfo/privacy
Current thread:
- Re: [privacy] privacy Digest, Vol 2, Issue 44 Mark Carey-Smith (May 25)
- <Possible follow-ups>
- Re: [privacy] privacy Digest, Vol 2, Issue 44 Fergie (May 25)