senooken JP Social
  • FAQ
  • Login
senooken JP Socialはsenookenの専用分散SNSです。
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Infected Moomin (moon@shitposter.club)'s status on Wednesday, 23-Dec-2020 04:46:22 JST Infected Moomin Infected Moomin
    Trump vetoing is our only hope now for avoiding that "felony for illegal streaming" law.
    In conversation Wednesday, 23-Dec-2020 04:46:22 JST from shitposter.club permalink
    • バツ子(痛いの痛いの飛んでけ;; (shmibs@tomo.airen-no-jikken.icu)'s status on Wednesday, 23-Dec-2020 04:46:21 JST バツ子(痛いの痛いの飛んでけ;; バツ子(痛いの痛いの飛んでけ;;
      in reply to
      @Moon ;;
      In conversation Wednesday, 23-Dec-2020 04:46:21 JST permalink
    • バツ子(痛いの痛いの飛んでけ;; (shmibs@tomo.airen-no-jikken.icu)'s status on Wednesday, 23-Dec-2020 04:53:08 JST バツ子(痛いの痛いの飛んでけ;; バツ子(痛いの痛いの飛んでけ;;
      in reply to
      • Brother (druid)
      @brother @Moon https://en.wikipedia.org/wiki/Steganography
      In conversation Wednesday, 23-Dec-2020 04:53:08 JST permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: upload.wikimedia.org
        Steganography
        Steganography ( (listen) STEG-ə-NOG-rə-fee) is the practice of concealing a message within another message or a physical object. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós (στεγανός), meaning "covered or concealed", and -graphia (γραφή) meaning "writing".The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret...
    • Brother (druid) (brother@kawen.space)'s status on Wednesday, 23-Dec-2020 04:53:09 JST Brother (druid) Brother (druid)
      in reply to
      @Moon While that can't hurt, I'd really rather people pooled together and tried to find ways to obfuscate that E2E is *even being used.*
      In conversation Wednesday, 23-Dec-2020 04:53:09 JST permalink
    • Infected Moomin (moon@shitposter.club)'s status on Wednesday, 23-Dec-2020 04:53:10 JST Infected Moomin Infected Moomin
      in reply to
      • Brother (druid)
      @brother I've long said that e2e is toast, I think we should fight for it as long as we can but it'll get outlawed eventually.
      In conversation Wednesday, 23-Dec-2020 04:53:10 JST permalink
    • Brother (druid) (brother@kawen.space)'s status on Wednesday, 23-Dec-2020 04:53:11 JST Brother (druid) Brother (druid)
      in reply to
      @Moon Don't worry, Biden will criminalise E2E in his second term anyway, right as the EU does ????
      In conversation Wednesday, 23-Dec-2020 04:53:11 JST permalink
    • バツ子(痛いの痛いの飛んでけ;; (shmibs@tomo.airen-no-jikken.icu)'s status on Wednesday, 23-Dec-2020 04:59:21 JST バツ子(痛いの痛いの飛んでけ;; バツ子(痛いの痛いの飛んでけ;;
      in reply to
      • Brother (druid)
      @brother @Moon it's impractical by necessity, mmm. no other way to hide that you're encrypting thingsmost workable have seen is systems that alternate using other platforms to post images with encrypted messages inside
      In conversation Wednesday, 23-Dec-2020 04:59:21 JST permalink
    • Brother (druid) (brother@kawen.space)'s status on Wednesday, 23-Dec-2020 04:59:22 JST Brother (druid) Brother (druid)
      in reply to
      • バツ子(痛いの痛いの飛んでけ;;
      @shmibs @Moon Absolutely agreed, but is there any existing, deployable application of it that could replace, say, OMEMO overnight?My understanding of stenography is that there has to be a plausible-looking fake message sent in order to not attract enough attention for the "mere presence" of the hidden message to be detected at all. Kind of like that one method of encrypting a partition that hides it "within" another partition full of clean data, so that if your laptop is seized by the spooks you have plausible deniability that the hidden partition even exists, and thus cannot be legally compelled to disclose the passwords.
      In conversation Wednesday, 23-Dec-2020 04:59:22 JST permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

senooken JP Social is a social network, courtesy of senooken. It runs on GNU social, version 2.0.2-beta0, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All senooken JP Social content and data are available under the Creative Commons Attribution 3.0 license.