Standard for SteGAnography
Eli Brandt
ebrandt at jarthur.cs.hmc.edu
Mon Mar 7 01:03:20 PST 1994
> My original response was concerning an algorithm "good enough to withstand
> an opponent who has full documentation of your algorithms and methods lots
> of funds, and everything except your keys."
That's what they have; what can they *do*? As I've been trying to
get across, that is not a full specification of capabilities.
Enough.
Eli ebrandt at hmc.edu
More information about the cypherpunks-legacy
mailing list