From: Robert Coyote (coyyote@hotmail.com)
Date: Thu Sep 20 2001 - 09:38:07 MDT
then of course theres double-tripple dipping wher you encrypt with system A
then encrypt the result with system B and so on
----- Original Message -----
From: "Eugene Leitl" <Eugene.Leitl@lrz.uni-muenchen.de>
To: <extropians@extropy.org>
Sent: Thursday, September 20, 2001 7:48 AM
Subject: RE: steganography
> On Thu, 20 Sep 2001, Harvey Newstrom wrote:
>
> > It's <www.outguess.org> not <www.outguess.com>, and I'm perfectly
> > familiar with it. It is a very wonderful program and much more secure
> > than other ones. But don't assume that it is "perfectly" secure.
>
> Duh. Perfect security is mythical, since infinitely expensive. In real
> world, the bottlenecks lie most assuredly not in the cryptoattack and
> cryptoanalysis region, so there's no point improving things there. You
> have to start with the human factors.
>
> For all practical purposes, a public binary blob containing state of the
> art steganography will a) never be recognized as such b) even if, the
> strong cryptosystem used will not be broken within a time window counted
> in decades.
>
>
>
This archive was generated by hypermail 2.1.5 : Sat Nov 02 2002 - 08:10:51 MST