The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
The Forum - On Line Opinion's article discussion area



Syndicate
RSS/XML


RSS 2.0

Main Articles General

Sign In      Register

The Forum > General Discussion > Can ASIO?Police ever Crack Terrorist Cypher ?

Can ASIO?Police ever Crack Terrorist Cypher ?

  1. Pages:
  2. 1
  3. 2
  4. 3
  5. Page 4
  6. 5
  7. 6
  8. 7
  9. 8
  10. All
Bazz quote "At normal resolutions the characters in the photo are not visable.
However it would only take seconds for software to find the characters
in the photo."

You do not know what you are talking about, please learn how something works before commenting like that.

Steganography look for a program then try it and come back with a more reasoned response.
Posted by Philip S, Tuesday, 27 November 2018 9:42:58 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Further, if you want to hide something real secret, hide it in a pornographic image, then hide that image in something bigger: even if someone suspects the larger object, they will think that you were merely hiding the pornographic image and won't look any further.
Posted by Yuyutsu, Tuesday, 27 November 2018 10:30:09 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Messages are embedded in photos all the time, a simple one is for glamour shots in magazines to be embedded with the word 'sex' and like short words, particularly of the four letter variety, such embeds were exposed as an advertizing gimmick at least fifty years ago.

This is more up to date:
http://www.psychologistworld.com/influence-personality/subliminal-advertising
Posted by Is Mise, Tuesday, 27 November 2018 2:05:29 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Please read before posting nonsense, what Yuyutsu and I are talking about is Steganography.

To simplify it you have a file any file you want to hide it you can hide it inside the data of another file.

For example you want to send someone a .txt document or a .jpg photo (remember any file you like) your file to hide is say 500k in size you get any other file say a .mp4 movie a .bmp picture file a Steganography program will hide the file so people only see 1 file unless you tell them something is inside it they will not know.

A 500k file can easily be hidden inside BUT the smaller the size of the other file the greater the chance of it being detected.

A 1K .txt file in a 20mb music file is going to draw no suspicion,

whereas a 5mb .txt file in the same 20mb music file would be suspicious.

Just read this link, for more info and programs.
http://hackersonlineclub.com/steganography/
Posted by Philip S, Tuesday, 27 November 2018 5:44:42 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Is Mise,
The book code was used a lot in the wartime.
It has a problem in that you have to agree on page line etc personally
as if you send it by mail, telephone etc etc.
With the PGP style programs you just exchange public keys by email.
Everybody has a public key and everyone can send messages to everyone
but no one else in the group can read each others messages.

Philip S, yes I know nothing about Stenography, never used it but even
bits in a sound recording could be found. In a 500kb file it would be
susceptible to a brute force attack, would it not ?
The text of course could be encyphered before input to the sound file.
Posted by Bazz, Tuesday, 27 November 2018 11:02:03 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Bazz Only an idiot would would put something large in a 500kb file.

To use brute force to find something first you have to know which file it is in then you have to know which of the many programs was used to hide something, good luck checking thousands of files.

Also brute force uses word dictionaries, some programs don't use passwords they can use files as the password some even use a password + a file or files + a set of numbers.

Most people would encrypt the .txt file before hiding it, if it was very sensitive info.
Posted by Philip S, Tuesday, 27 November 2018 11:25:10 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
  1. Pages:
  2. 1
  3. 2
  4. 3
  5. Page 4
  6. 5
  7. 6
  8. 7
  9. 8
  10. All

About Us :: Search :: Discuss :: Feedback :: Legals :: Privacy