Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Cryptography [PART I]

Name: Cryptography 2012-10-16 22:36

Cryptography

Name: Anonymous 2012-11-02 22:12

>>123
It is perfectly possible for steganography to use a key. But the purpose of steganography isn't to make it so they can't get the data, since that can be encrypted anyway. The goal is to hide the data's presence.

>>I'm just saying that you can get in deep shit just by writing free software.
>Which is an entirely irrelevant point.
It establishes a need for hiding information.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List