-----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type: 2001,MIC-CLEAR Originator-Name: uri@watson.ibm.com Originator-Key-Asymmetric: MIGcMAoGBFUIAQECAgQAA4GNADCBiQKBgQC8G6+5wJDTbII6rK3nx6/XSWIE79FW 1UnBUJx1lAEbay5o7larnOTWbVicXRfkd8cJxl4FAQ3z/O4vhNvqMqkfGPt48F1t O82PD1NstJ3zuMqCCSfTk/Lo3KNh2zz8oGQG8XOfK+UnGcqWhgZ2froBc4yNFlyK To0gYp7xKqpcLQIDAQAB MIC-Info: RSA-MD5,RSA, rwr1sC6NxFTeD2RQkn1d3a9DD72bfS6RX6KvRfCERRGxlNsIbqkSciSNmHxTJPRH /SuFRODhd9eqhyO5a4KORoAIse/QJjgpWDY/gcUx8WmaPBLTUyImVmBUHeaWlBG6 8zwHpOLrZHlX3j//9bpITl+0N90K9Nn4j2DFRxHQAV8= Stu Klingman writes:
Someone wrote:
b) If it's played and recognized - one can trace your source (a CD, a tape of radio broadcast, whatever) and do a comparison. Then the file containing of all the LSBs is cryptanalyzed...
Actually, this is not really a problem. The odds of being able to resample, even using the same source and come up with the same byte string is infinitesmal.
Remember - the goal is to HIDE the fact, that there's a message! If, having CDs and DAT tapes widely available, somebody sends a home-brew digitized copy of it, won't it look somewhat suspicious for KGB? And if/when they throw you in a nice small cell, you can explain your innocence to the walls at infinitum (:-).
You've got chaos theory on your side here with massive "Sensitive Dependence on Initial Conditions."
You're certainly right. But still see above.
Just make sure to an application like Shredder or Flamefile to permanently erase your initial sample, and nobody should be able to tell. (unless they are aware of the trick beforehand)
Do you mean, THEY don't monitor this forum? (:-) Regards, Uri. - ------------ <Disclaimer> -----END PRIVACY-ENHANCED MESSAGE-----