[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
steganography & mimic function? (Re: [17] hidden links)
- To: Ted Smith <[email protected]>
- Subject: steganography & mimic function? (Re: [17] hidden links)
- From: [email protected] (Adam Back)
- Date: Sun, 29 Sep 2013 20:53:31 +0200
- Cc: [email protected]
- In-reply-to: <1380476988.13261.0.camel@anglachel>
- References: <CADhsnxdvGkbo=koAypUHa-1g1UBQgUkEC_rGpV=yh+07B3LNgQ@mail.gmail.com> <1380476988.13261.0.camel@anglachel>
I am becoming convinced Brian is using this list as a steganographic channel
using steganography and english mimic functions based on some corpous of
text (eg using markov chains - its surprisingly effective if you try it,
given the complete lack of actual textual understanding of the model).
Adam
On Sun, Sep 29, 2013 at 01:49:48PM -0400, Ted Smith wrote:
>On Sun, 2013-09-29 at 01:06 -0500, brian carroll wrote:
>> another film, The Company (2007) with Michael Keaton as the head of a
>> mole-hunting counterintelligence unit, an orchid lover known as
>> "mother", conveys this symbolic dimension likewise in a larger
>> symbolic framework that cultural communication inherently exists
>> within, as the context for shared meaning via language. and thus if
>> [signs] are mediated in this way as a way of conveying stories, why
>> would they be limited in this same depth in a realm of computation
>> involving such [signs], unless of course this is not the case and
>> other approaches exist within crypto.
>
>This is an especially poignant comparison point considering the relative
>lack of study of new AES modes.