Re(2): A GPG version of the PGPstealth program?
   
    Bernd Eckenfels
     
    lists@lina.inka.de
       
    Wed Aug 22 03:09:01 2001
    
    
  
On Tue, Aug 21, 2001 at 08:46:04PM +0100, Andrew Marlow wrote:
> Besides, repeated exchanges of non-ASCII attachments
> is not a very deniable form of steg.
umm.. what do u exchange repeaded in ascii? classic books? dont think this
is more realistic workload than images. But if you only want to fool
firewalls i guess a simple stegano is enough.
Greetings
Bernd
-- 
  (OO)      -- Bernd_Eckenfels@Wendelinusstrasse39.76646Bruchsal.de --
 ( .. )  ecki@{inka.de,linux.de,debian.org} http://home.pages.de/~eckes/
  o--o     *plush*  2048/93600EFD  eckes@irc  +497257930613  BE5-RIPE
(O____O)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!