Recent comments in /f/Futurology
k_plusone t1_jbblpah wrote
Reply to comment by D1rtyH1ppy in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
That was only 7 years ago. Is time not passing fast enough for you already?
czl t1_jbbk1ar wrote
Reply to comment by greenappletree in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Originals are proof stenography was used. You destroy those since they are not needed for anything after you send the altered media.
czl t1_jbbjlgv wrote
Reply to comment by volci in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
> You have to have the unaltered originals somewhere, or you won't know what you hid where
You do not need originals.
Data can be encoded to look like noise yet still be decoded if you know the algorithm despite not having unaltered originals.
This is commonly done when secret messages are EM transmitted for example with turbo codes: https://en.m.wikipedia.org/wiki/Turbo_code
With stenography instead of encoding messages in the EM spectrum you encode in the media (sound, images, video, ...) you are using.
If you have data treated to look random (compressed / encrypted) you can for example encode it using the "least significant bits" of your media which are mostly sensor noise anyways.
A more sophisticated approach can spread this out across pseudo random offset pixels. Your algorithm knowing the pseudo random sequence can decode your data analogous to https://en.m.wikipedia.org/wiki/Spread_spectrum techniques for secret messages transmission and applications like: https://en.m.wikipedia.org/wiki/Low-probability-of-intercept_radar
burnnottice88 t1_jbbj8c8 wrote
Reply to comment by kropkiide in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Human behaviour is studied at great length and you can get one hell of a lot of info from a person's smartphone what they watch, for how long, what they watch afterwards, what they upvotes, downvote. Tie that in with smart watches that measure your bpm and blood pressure etc. That info is worth billions to the right people.
Okikidoki t1_jbbj5b5 wrote
Reply to A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Hdsjsjbdhs shhsv vsghs ss djdjxid xbxbns djxjebx xnxjs znnsnx xnxnd
[deleted] t1_jbbiy04 wrote
[deleted] t1_jbbix1o wrote
[deleted] t1_jbbirow wrote
Mechasteel t1_jbbh94i wrote
Reply to comment by zalgorithmic in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Cryptography is so when they see your message they can't understand it. Steganography is so they don't see your message. Shannon entropy is how much your message looks like noise, which is coincidentally the same as data density.
Long_Educational t1_jbbeuaw wrote
Reply to comment by kropkiide in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
You ever wonder why they stopped making such a big deal about obtaining access anymore? Because they already got the access they wanted.
SandAndAlum t1_jbbeo4b wrote
Reply to comment by kropkiide in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
They think they'll always be wearing the boot.
cas-san-dra t1_jbbe9a0 wrote
Reply to A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
In order to count as non-broken, an encryption algorithm must already be secure against a distinguishing attack. All you need to do is grab a non-broken algorithm, and stick your cyphertext in a place where you can expect to find random junk anyway. Like the least significant bit of an image or frame of a video. This is the standard obvious thing that everybody has known about since forever.
I fail to see why you would need to improve upon this way.
LummoxJR t1_jbbdp5l wrote
Reply to comment by Schrecht in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
There are forms of steganography you can detect without the original, if you have an idea what patterns to look for. Ultimately the data is there somewhere.
warlock415 t1_jbbcbvr wrote
Reply to comment by volci in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Not necessarily. Consider the following: I take a picture of my cat using a digital camera. I open up a laptop without a hard drive, boot to a Linux thumbdrive, copy over the picture from the camera's SD card. I make the picture smaller by some percentage amount and then make the picture bigger by the reciprocal. Save the output of that process and use that as the base for the steganography.
Now, even if someone gets their hands on that SD card and somehow defeats deleting the picture / destroying the card, they still don't have the "original" image that went into the steganography process.
HeavensCriedBlood t1_jbbc4bo wrote
Reply to Stanford Medicine scientists have found a way to transform cancer cells into weapons against cancer. by sgfgross
Wait, I've seen I Am Legend before.
All jokes aside, this is great progress.
kropkiide t1_jbbb4wh wrote
Reply to comment by D1rtyH1ppy in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
I always wondered why the government would want access to people's personal shit. I mean, they're people too...
[deleted] t1_jbb9me5 wrote
volci t1_jbb8val wrote
Reply to comment by warlock415 in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
someone can
The sender, for example
filthmrchristian t1_jbb6un1 wrote
Reply to A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Meanwhile over at the nsa a bunch of people are looking at each other with a wry smile 😏
[deleted] t1_jbb609p wrote
D1rtyH1ppy t1_jbb44q6 wrote
Reply to comment by HastyBasher in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
It's probably developed by the Israeli government and sanctioned by the phone manufacturers. Pegasus 2 doesn't need you to click on anything or download a package, the sender just needs your phone number. It cleans itself up nicely also so you can't tell that it was ran on your device. This is most likely the back door that congress was asking for about ten years ago when Apple refused to unlock the phone if the Riverside, CA shooters. Apple gets to claim it doesn't violate the users privacy and the government get access to every smartphone in the world.
The_Retro_Bandit t1_jbb4225 wrote
Reply to comment by D_D in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Encrypt a red herring or low value info and inside that put the sten?
zalgorithmic t1_jbb400v wrote
Reply to comment by DoktoroKiu in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Isnt one of the main points of good cryptography to have the message already be indistinguishable from noise? Just build up enough entropy that it seems like noise unless you have the proper key.
ScratchinSamurai420 t1_jbboacc wrote
Reply to comment by HastyBasher in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
It’s terrifying and used in the worst ways possible