Bitcoin Forum
June 29, 2017, 02:17:50 AM *
News: Latest stable version of Bitcoin Core: 0.14.2  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: TrueCrypt Steganography, hide data in quicktime files  (Read 2366 times)
Nefario
Hero Member
*****
Offline Offline

Activity: 602


GLBSE Support support@glbse.com


View Profile WWW
February 25, 2011, 01:26:38 PM
 #1

http://keyj.s2000.at/?p=458
See link, thought it would be interesting.

PGP key id at pgp.mit.edu 0xA68F4B7C

To get help and support for GLBSE please email support@glbse.com
1498702670
Hero Member
*
Offline Offline

Posts: 1498702670

View Profile Personal Message (Offline)

Ignore
1498702670
Reply with quote  #2

1498702670
Report to moderator
The network tries to produce one block per 10 minutes. It does this by automatically adjusting how difficult it is to produce blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1498702670
Hero Member
*
Offline Offline

Posts: 1498702670

View Profile Personal Message (Offline)

Ignore
1498702670
Reply with quote  #2

1498702670
Report to moderator
1498702670
Hero Member
*
Offline Offline

Posts: 1498702670

View Profile Personal Message (Offline)

Ignore
1498702670
Reply with quote  #2

1498702670
Report to moderator
Vasiliev
Jr. Member
*
Offline Offline

Activity: 55


View Profile
February 26, 2011, 01:15:25 AM
 #2

I do not believe this would work against a determined (and very smart) attacker. Although video files test as being completely random, I believe it is quite likely that there are patterns within them. See this comparison of overheads for containers. In a ~993MB MP4 file, the MP4 container is about 2.4MB. Not much, but it seems that MP4 structures would appear at predictable areas in the file. (MKV is 1.5-1.8MB, btw)

Additionally, it is easy to figure out if One Of These Things Just Doesn't Belong with a video file. Just demux the video file. (There are many, many tools to do this. FFmpeg can.) If the video/audio tracks add up to less than the actual filesize (minus approximate overhead), then there is something odd about that file. Or, obviously, if one of the tracks is of unknown type and you can't decode it.


But I am assuming a "We only have twenty four hours to disarm the bomb and the code is in this computer!!" situation. Against a less determined, or more cursory, inspection (ACTA's border searches, for example) this steganography would work great.

1DiaPwjDV6rLB2KrBA7gzitzSWCJmXnESy
Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!