By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org
PART 2 Cryptography Fundamentals: You can’t hide what isn’t there
As previously discussed in part 1 of this series communication can exist between one or more entities without ever making their existence known even when such entities have intelligence that their communications are being monitored. This is seen at any two points where messages must fall into ‘public space’ during ransit from sender to recipient. One of the best examples the coded communication that occurs in prison systems. Where mixed in various methods are orders to get things done; contraband gotten; kill people.
What you will learn…
how to make important information nearly invisible to the naked eye
What you should know…
basic obfuscation techniques
Please keep in mind that comments are moderated and
rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let us have a personal and meaningful conversation instead.
You must be logged in to post a comment.