Feeds

Research slaps crypto-banning Feds

Return to your Ewok Villages, eBay bidders - it's safe

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

While America's own fundamentalists - led by US Attorney General John Ashcroft - prepare the most draconian assault on Americans' civil liberties since the second world war, their very own causus beli seems to be vanishing.

The enormous increase in surveillance has been justified by claims that terrorists are using cryptography, and in particular steganography: the art of hiding information. USA Toady has run a series of articles on the theme, all predictably quoting 'anonymous' security sources, describing how messages are passed hidden in picture innocuous picture files on sites such as eBay.

Or maybe, not so innocuous. The tabloid even managed to score a tasteless bullseye last week with an article that combined pornography, cryptography, terrorism and sport in the same article. For any readers who doubted the message, it was illustrated with a picture of /bin/laden himself.

But steganography isn't nearly as widespread a threat as you'd believe.

A research paper published a fortnight before the attacks on US civilians and made public this week has discovered no examples of steganographic content on eBay whatsoever.

Having exhaustively examined two million images on eBay, not one was found to contain steganographic content, according to academics Niels Provos and Peter Honeyman, who've published the paper at the University of Michigan's website.

15,000 of the two million images were deemed to have some form of steganographically-encrypted content by the JPIIhide program. But after subjecting the images to dictionary attacks, not a single hidden message was discovered. The researchers discuss, and dismiss, the possibility that strong passwords were being used. In short, they conclude, there is no significant use of steganography on the Internet.

Put in context, this research could simply prove that terrorists don't use eBay to as a source for populating their model Ewok Villages.

But more seriously it rubbishes one of the primary reasons for cracking down on personal privacy in the US.

The paper, available in Postscript or PDF formats (and rendered in that spidery font that cryptographers seem to love) is a 800KB download here [PDF]. ®

Remote control for virtualized desktops

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?