Return to Unfiction unforum
 a.r.g.b.b 
FAQ FAQ   Search Search 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
Website Restoration Project
This archiving project is a collaboration between Unfiction and Sean Stacey (SpaceBass), Brian Enigma (BrianEnigma), and Laura E. Hall (lehall) with
the Center for Immersive Arts.
Announcements
This is a static snapshot of the
Unfiction forums, as of
July 23, 2017.
This site is intended as an archive to chronicle the history of Alternate Reality Games.
 
The time now is Wed Nov 13, 2024 2:39 am
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Meta » Various & Sundry
Steganography and whether the terrorists are using it
Moderators: Giskard, imbri, ndemeter
View previous topicView next topic
Page 1 of 1 [1 Post]  
Author Message
SpaceBass
The BADministrator


Joined: 20 Sep 2002
Posts: 2701
Location: pellucidar

Steganography and whether the terrorists are using it

Here's an interesting web adaptation of a PowerPoint presentation on steganography prepared by the guy nice lady (thanks Elonka!) who cracked the PhreakNIC v3.0 Code.
Quote:
It's a ~70-slide discussion of what steganography is, how it's used, and whether or not Al Qaeda might or might not have been using steganography to send hidden messages.

Although the focus of the presentation is steganography, and specifically its possible use by terrorists, there are also many other good points touched on by the author with respect to many different ways to hide or secretly transmit data using the internet. I am personally intrigued by the mention of the POW code, which predated the internet by quite a spell and was an extremely low-tech secret messaging technique.

Many of these techniques could be used in our gaming genre, and the author offers plenty of tips for how to spot possible repositories for hidden data. He She even went so far as to embed (though not terribly subtly) a meta-message in the presentation itself!

Tip: I didn't check out the lo-res version but if you view the hi-res version, some of the slides have animations that can be activated by clicking within the slide (sometimes multiple times per slide). If you come across a slide that seems sadly lacking in information, try clicking on it. Smile

P.S. The PhreakNIC Code Tutorial looks pretty damn interesting too, for combining a great many different cipher and encryption techniques (but I don't have time to read it all right now...it's late!).
_________________
Alternate Reality Gaming
http://www.unfiction.com/


PostPosted: Mon Dec 16, 2002 5:10 am
 View user's profile Visit poster's website
 Back to top 
Display posts from previous:   Sort by:   
Page 1 of 1 [1 Post]  
View previous topicView next topic
 Forum index » Meta » Various & Sundry
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group