Re: Steganography By Frequency ? – A Thought.



It is valid for your stego plan to be used secretly. Alice could have
a meeting with Bob and tell him your Stego plan and they could use it
secretly. It is important that Alice does not continue on to Twitter
to post the stego plan she has started with Bob. If Alice put your
stego plan on the internet, the NSA and Vauxhall Cross code breakers
will keep track of this stego plan.

Often, a cryptographer has no Bob who is so compliant about messaging.
Alice and Bob would not need to meet if they used public key
cryptography. It is fun to create stego algorithms for text and there
are a billion ways to do it. Your plan is reasonable. The indexing
method is easy to remember. Thanx.
.



Relevant Pages

  • =?windows-1252?Q?Re=3A_Steganography_By_Frequency_=3F_=96_A_Thought=2E?=
    ... It is important that Alice does not continue on to Twitter ... to post the stego plan she has started with Bob. ... a cryptographer has no Bob who is so compliant about messaging. ...
    (sci.crypt)
  • Is this a hoax or real?
    ... Coan's free Hidden File Detector software. ... Alice is the bad guy. ... location of a file that Bob, the good guy, can get to. ... Alice has her own Web server. ...
    (microsoft.public.security)
  • Re: Is this a hoax or real?
    ... Alice is the bad guy. ... location of a file that Bob, the good guy, can get to. ... Alice has her own Web server. ... Alice can pilfer more than a file. ...
    (microsoft.public.security)
  • Does Microsoft listen or care?
    ... Alice is the bad guy. ... location of a file that Bob, the good guy, can get to. ... Alice has her own Web server. ... Alice can pilfer more than a file. ...
    (microsoft.public.win2000.security)
  • Whats the problem
    ... Alice is the bad guy. ... location of a file that Bob, the good guy, can get to. ... Alice has her own Web server. ... Alice can pilfer more than a file. ...
    (microsoft.public.security)