On February 15, 2010, Gordon Snyder and I recorded a podcast titled Vice over IP: Embedding Secret Messages in Online Conversations. In the podcast we discuss embedding secret messages in images and Voice over IP sessions using a technology called steganography. The podcast is based on an excellent article in this months IEEE Spectrum titled Vice Over IP: The VoIP Steganography Threat. Here's a list of some of the questions we answer:
Before we delve into this new topic, lets provide the audience with a little background. First what is steganography - sounds like a dinosaur?
Can you give us some examples?
How does steganography work?
How do we stop it? Can we?
How would spectrum analysis help detect these messages?
What is network steganography and how does it work?
What are the three methods or flavors of network steganography that researchers have developed? Can you describe each?
Should we be worried?
Can you give us some examples?
How does steganography work?
How do we stop it? Can we?
How would spectrum analysis help detect these messages?
What is network steganography and how does it work?
What are the three methods or flavors of network steganography that researchers have developed? Can you describe each?
Should we be worried?
Fascinating and interesting stuff. Here's how to listen:
To access show notes and audio of our 24 minute and 5 second podcast titled Vice over IP: Embedding Secret Messages in Online Conversations, click here.
Listen to it directly in your web browser by clicking here.
If you have iTunes installed you can subscribe to our podcasts by clicking here.
No comments:
Post a Comment