Author Topic:  (Read 1152 times)

0 Members and 1 Guest are viewing this topic.

Offline SirLinksALot

  • TBR Contributor
  • Hero Member
  • *****
  • Posts: 3,561
« on: November 17, 2016, 11:40:25 AM »
« Last Edit: November 17, 2016, 11:43:06 AM by SirLinksALot »

Offline SirLinksALot

  • TBR Contributor
  • Hero Member
  • *****
  • Posts: 3,561
« Reply #1 on: November 17, 2016, 11:48:17 AM »

Offline EC

  • Shanghaied Editor
  • Hero Member
  • ****
  • Posts: 23,836
  • Cats rule. Dogs drool.
« Reply #2 on: November 17, 2016, 11:48:59 AM »
Can someone with a bit of time translate this into sanespeak please?
The universe doesn't hate you. Unless your name is Tsutomu Yamaguchi

Avatar courtesy of Oceander

I've got a website now: Smoke and Ink

Online Sanguine

  • Member
  • Hero Member
  • ****
  • Posts: 16,701
  • Native Texan
« Reply #3 on: November 17, 2016, 11:55:24 AM »
For later.  Maybe.
There are no safe spaces in real life.   - LMAO

Walk in Wisdom
See then that you walk circumspectly, not as fools but as wise, redeeming the time, because the days are evil.

But the noble make noble plans, and by noble deeds they stand.

Offline Free Vulcan

  • Member
  • Hero Member
  • ****
  • Posts: 9,207
  • Ah, the air is so much fresher here...
« Reply #4 on: November 17, 2016, 12:22:04 PM »
If unrefutable proof existed about these high profilers being involved in pedophile rings, and I were rich and not a Christian, every one would be disappeared till they were all gone.
And a country boy will survive.

Offline SirLinksALot

  • TBR Contributor
  • Hero Member
  • *****
  • Posts: 3,561
« Reply #5 on: November 17, 2016, 12:53:28 PM »

Offline EC

  • Shanghaied Editor
  • Hero Member
  • ****
  • Posts: 23,836
  • Cats rule. Dogs drool.
« Reply #6 on: November 17, 2016, 01:00:12 PM »
Thank you.  :laugh:

The universe doesn't hate you. Unless your name is Tsutomu Yamaguchi

Avatar courtesy of Oceander

I've got a website now: Smoke and Ink

Online Sanguine

  • Member
  • Hero Member
  • ****
  • Posts: 16,701
  • Native Texan
« Reply #7 on: November 17, 2016, 01:06:14 PM »
That was helpful, @SirLinksALot.
There are no safe spaces in real life.   - LMAO

Walk in Wisdom
See then that you walk circumspectly, not as fools but as wise, redeeming the time, because the days are evil.

But the noble make noble plans, and by noble deeds they stand.

Offline Oceander

  • Technical
  • Hero Member
  • ****
  • Posts: 47,370
  • Chief Dork
« Reply #8 on: November 17, 2016, 01:20:24 PM »
As an aside, steganography is an interesting topic in itself.  It can be accomplished not only by "hiding" one file inside another (which isn't limited to image files) but also by changing the values of certain pixel data within the image itself to encode the message.  Images like jpg files are particularly useful for this because the images are typically compressed using a lossy compression algorithm (meaning some of the original data cannot be recovered from the compressed file) and because the images are essentially analog (i.e., many shades of color, not just a limited palette, like in gif images); as a result, the additional noise introduced by encoding a message using altered pixel values generally won't be noticeable upon visual inspection of the image.  There are also other techniques that can be used. For example, the jpg file specification allows a thumbnail image to be included in the file along with the main image. That is typically a smaller scale image with less detail.  It can be used for encoding purposes and the altered pixels are even less obvious from a visual inspection of the file.  Also, jpg files can contain a lot of metadata about the image itself; this is so-called exif data because of the file specification it is based on. Most of the data fields are specified in the specification, which is open source; however, the specification allows camera makers to include additional fields that are in a proprietary format that can only be understood using the manufacturers own software (typically, the firmware in the camera itself).  Most camera makers include this additional info.  Since it is by nature proprietary, it would be possible to conceal additional data within this section of the exif data.  Although it would appear corrupted to the manufacturers own hardware, the exif specification requires exif readers to ignore corrupted data, so hidden data in this section would either not be noticed, or would be flagged as corrupted, even by the camera makers own software.  As a result, a casual inspection of the jpg file, even using the makers own software, would probably not reveal the hidden data (but somebody who was already suspicious of the image might decide that apparently corrupted data required further investigation).

Other files can also be used.  For example, pdf files can be used quite easily, particularly if it's a PDF that is (a) a high enough version that it can be edited (editing usually leaves the edited-out information orphaned within the file itself unless the file has been optimized to remove old data that is no longer actively used to build the document that is visible), and (b) uses encryption.  Again, unless one already suspects the file of containing hidden data, the hidden data may not be found.  PDF files have been used to carry malware (they are really tiny programs), so antivirus software will scan them, but unless the antivirus is set to exclude all files containing any data that isn't used to build the visible file, the antivirus software probably wouldn't flag the file as suspicious so long as the hidden data didn't match any of the malware signatures antivirus software uses to identify suspicious files.

Steganography can be quite fun. 

Offline SirLinksALot

  • TBR Contributor
  • Hero Member
  • *****
  • Posts: 3,561
« Reply #9 on: November 17, 2016, 01:24:21 PM »
Steganography (US Listeni/?st?.???n??.?r?.fi/, UK /?st??.??n??.r?.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (????????), meaning "covered, concealed, or protected", and graphein (???????) meaning "writing".

Offline Oceander

  • Technical
  • Hero Member
  • ****
  • Posts: 47,370
  • Chief Dork
« Reply #10 on: November 17, 2016, 01:26:11 PM »
P.s., if you want to see something surprising, find an old PDF file, typically version 1.4, and open it with a simple text editor, like MS Notepad (MS Word won't work, generally).

Offline The_Reader_David

  • Hero Member
  • ****
  • Posts: 505
« Reply #11 on: January 09, 2017, 11:12:21 AM »
Perhaps everyone should pause to read Umberto Eco's Foucault's Pendulum before exerting any more mental effort in pursuit of this.
And when they behead your own people in the wars which are to come, then you will know what this was all about.


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf