integrating GPG with deniable steganography
Andrew Marlow
marlowa at apmsoftwareltd.alkazar.co.uk
Sun Mar 18 00:40:01 CET 2001
Thanks for your reply. It is very detailed and will
take me a while to sift through. However one point that
comes to mind straight away is to do with security-through-obscurity
(STO). IMO, STO is no security at all. History has shown that
the strength must be in the key, and in the case of steg it must
also be in deniability. But deniability is not improved
by STO. We must assume that the warden knows what kind of steg
we are using.
+-----------------------------------------------------------------------+
| Copyright (c) 2000 APM Software Ltd. All rights reserved.
| My domain is apmsoftwareltd dot alkazar dot co dot uk.
| My email username is apm6674.
| The opinions expressed in this document are entirely my own.
| I do not speak for anyone else.
| I live in the UK. See www.fipr.org for why I no longer use PGP/GNUPG.
+-----------------------------------------------------------------------+
More information about the Gnupg-devel
mailing list