By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org
PART 2 Cryptography Fundamentals: You can’t hide what isn’t there
As previously discussed in part 1 of this series communication can exist between one or more entities without ever making their existence known even when such entities have intelligence that their communications are being monitored. This is seen at any two points where messages must fall into ‘public space’ during ransit from sender to recipient. One of the best examples the coded communication that occurs in prison systems. Where mixed in various methods are orders to get things done; contraband gotten; kill people.
What you will learn…
how to make important information nearly invisible to the naked eye
What you should know…
basic obfuscation techniques
RESTRICTED AREA – FOR SUBSCRIBERS ONLY