Re(2): A GPG version of the PGPstealth program?
Bernd Eckenfels
lists@lina.inka.de
Wed Aug 22 03:09:01 2001
On Tue, Aug 21, 2001 at 08:46:04PM +0100, Andrew Marlow wrote:
> Besides, repeated exchanges of non-ASCII attachments
> is not a very deniable form of steg.
umm.. what do u exchange repeaded in ascii? classic books? dont think this
is more realistic workload than images. But if you only want to fool
firewalls i guess a simple stegano is enough.
Greetings
Bernd
--
(OO) -- Bernd_Eckenfels@Wendelinusstrasse39.76646Bruchsal.de --
( .. ) ecki@{inka.de,linux.de,debian.org} http://home.pages.de/~eckes/
o--o *plush* 2048/93600EFD eckes@irc +497257930613 BE5-RIPE
(O____O) When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!