FITUG e.V.

Förderverein Informationstechnik und Gesellschaft

Re: <nettime> "Pirate Utopia," FEED, February 20, 2001

------- Forwarded message follows ------- Date sent: Fri, 21 Sep 2001 08:27:00 +1000 (EST) From: Grant Bayley <gbayley@ausmac.net> To: <jmdibbell@home.com> Copies to: <cryptography@wasabisystems.com> Subject: Re: <nettime> "Pirate Utopia," FEED, February 20, 2001

> --- begin forwarded text
>
> Status:  U
> From: "Julian Dibbell" <jmdibbell@home.com>
> To: <nettime-l@bbs.thing.net>
> Subject: <nettime> "Pirate Utopia," FEED, February 20, 2001
> Date: Thu, 20 Sep 2001 08:37:20 -0500
> Sender: nettime-l-request@bbs.thing.net
> Reply-To: "Julian Dibbell" <jmdibbell@home.com>
>
> Key concepts: steganography, encryption, Osama bin Laden,
> intellectual property, temporary autonomous zone, pirates.

It's a shame that Niels Provos, one of the main developers of open-source Steganography software at the moment wasn't able to detect a single piece of information hidden steganographically in a recent survey of two million images... Sort of destroys the whole hype about the use of it by criminals. Details on the paper below:

Date: Sat, 15 Sep 2001 17:36:36 -0600 From: aleph1@securityfocus.com To: secpapers@securityfocus.com Subject: Detecting Steganographic Content on the Internet

Detecting Steganographic Content on the Internet Niels Provos and Peter Honeyman

Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their accomplices. In particular, images on the internet were mentioned as the communication medium. While the newspaper articles sounded very dire, none substantiated these rumors. To determine whether there is steganographic content on the Internet, this paper presents a detection framework that includes tools to retrieve images from the world wide web and automatically detects whether they might contain steganographic content. To ascertain that hidden messages exist in images, the detection framework includes a distributed computing framework for launching dictionary attacks hosted on a cluster of loosely coupled workstations. We have analyzed two million images downloaded from eBay actions but have not been able to find a single hidden message.

http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.ps.gz

--------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com ------- End of forwarded message -------

Zurück