Standard for SteGAnography

Eli Brandt ebrandt at jarthur.cs.hmc.edu
Mon Mar 7 01:03:20 PST 1994


> My original response was concerning an algorithm "good enough to withstand 
> an opponent who has full documentation of your algorithms and methods lots 
> of funds, and everything except your keys."

That's what they have; what can they *do*?  As I've been trying to
get across, that is not a full specification of capabilities.
Enough.

   Eli   ebrandt at hmc.edu







More information about the cypherpunks-legacy mailing list