Re(2): A GPG version of the PGPstealth program?

Bernd Eckenfels lists at lina.inka.de
Wed Aug 22 04:09:01 CEST 2001


On Tue, Aug 21, 2001 at 08:46:04PM +0100, Andrew Marlow wrote:
> Besides, repeated exchanges of non-ASCII attachments
> is not a very deniable form of steg.

umm.. what do u exchange repeaded in ascii? classic books? dont think this
is more realistic workload than images. But if you only want to fool
firewalls i guess a simple stegano is enough.

Greetings
Bernd
-- 
  (OO)      -- Bernd_Eckenfels at Wendelinusstrasse39.76646Bruchsal.de --
 ( .. )  ecki@{inka.de,linux.de,debian.org} http://home.pages.de/~eckes/
  o--o     *plush*  2048/93600EFD  eckes at irc  +497257930613  BE5-RIPE
(O____O)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!




More information about the Gnupg-devel mailing list