17 Dec
2003
17 Dec
'03
11:17 p.m.
paul@poboy.b17c.ingr.com (Paul Robichaux) describes procedure for preparing and sending steganographically-concealed data via Usenet:
4. Post to Usenet, indicating the source of the materials (i.e. "This picture came from `Girls of The Rural South, vol 1'" or "Audio sampled from Michael Jackson's _Dangerous_")
Has anyone already tried looking for structure in the LSB's of the "megabytes of copyright violations" already flowing thru alt.binaries.pictures.* ? -Anthony Garcia agarcia@neosoft.com --Why, didn't you know? That's how the blacknet.* hierarchy gets propagated...