Standard for SteGAnography

Eli Brandt ebrandt at
Mon Mar 7 01:03:20 PST 1994

> My original response was concerning an algorithm "good enough to withstand 
> an opponent who has full documentation of your algorithms and methods lots 
> of funds, and everything except your keys."

That's what they have; what can they *do*?  As I've been trying to
get across, that is not a full specification of capabilities.

   Eli   ebrandt at

More information about the cypherpunks-legacy mailing list