From 74f180e26bab1a3f3409b22c17e97302b3314926 Mon Sep 17 00:00:00 2001 From: Zesc Date: Fri, 30 Aug 2024 19:55:56 +0200 Subject: [PATCH] Intro Steganography --- opsec/steg/index.html | 194 ++++++++++++++++++++++++++++++ opsec/steganography/index.html | 207 +++++++++++++++++++++++++++++++++ 2 files changed, 401 insertions(+) create mode 100644 opsec/steg/index.html create mode 100644 opsec/steganography/index.html diff --git a/opsec/steg/index.html b/opsec/steg/index.html new file mode 100644 index 0000000..04a1bb2 --- /dev/null +++ b/opsec/steg/index.html @@ -0,0 +1,194 @@ + + + + + + + + + + + SRVNAME Setup + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+
+ Previous Page

nihilist - 00 / 00 / 00

+

SRVNAME Setup

+ +

+ +
+
+
+
+ + +
+
+
+
+

Initial Setup

+

+ +

+	
+
+ +

+ +

+	
+
+ +

+ +

+	
+
+
+
+
+
+ +
+
+
+
+

Setup



+

+ +

+	
+
+ +

+ +

+	
+
+ +

+ +

+	
+
+ +
+
+
+
+ + + +
+
+
+
+

Setup



+

+

+	
+
+ +

+

+	
+
+ +

+

+	
+
+ +
+
+
+
+ + + +
+
+
+
+

Nihilism

+

+ Until there is Nothing left. + +

+
+ +
+

My Links

+

+ + RSS Feed
Matrix Chat
+ +

+
+ +
+

About nihilist

+

Donate XMR: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8


Contact: nihilist@nowhere.moe (PGP)

+
+ +
+ +
+
+ + + + + + + diff --git a/opsec/steganography/index.html b/opsec/steganography/index.html new file mode 100644 index 0000000..b52a057 --- /dev/null +++ b/opsec/steganography/index.html @@ -0,0 +1,207 @@ + + + + + + + + + + + Other sources of Plausible Deniability: Steganography + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+
+ Previous Page

Zesc - 2024-08-30

+

Other sources of Plausible Deniability: Steganography

+ +

Steganography is the craft of hiding messages. It is a close relative of cryptography, but where cryptography strives to conceal the contents of a messages, steganography attempts to conceal its presence in the first place. Therefore steganography helps avoiding suspicion and providing deniability.

+ +

The important difference between the two fields is adherence to Kerckhoffs's principle: the assumption that an algorithm must be publicly known to guarantee that it has no flaws or backdoors. (This is the reason why you should only use open source crypto software and never roll your own crypto.)
Steganography does the opposite by relying on security by obscurity: the method by which you hid your data must be kept secret.

+ +

That means that whilst complementary to cryptography, steganography on itself is less secure than the mathematically provable security provided by cryptography. Think of it as tucking away your valuables in secret location versus putting them into a sturdy safe. The safe may draw immediate attention by burglars, but provides reliable resistance to attacks, whilst whether they find your hidden stash is up to chance.

+ +

The why use steganography at all?

+

In military science, there is the concept of the Integrated Survivability Onion — in short, it describes the idea that they can't kill you if they don't hit you, that they can't hit you if they don't shot at you and that they can't shot at you if they don't see you. The same thing applies to every good digital defense-in-depth approach. Using steganography can't harm you, it just shouldn't be all your rely on. In our example, a hidden safe is better than either option on its own.

+ +

The main strength of it is that steganography can conceal metadata to some extent. Metadata (i.e. data about data and communications) is the primary way that state actors identify targets. When you can become guilty by association, your primary concern may be communicating in public without anyone noticing and not the confidentiality of your communications. (In fact, since many cryptographic schemes attest the identity of the sender, e.g. signatures, you should avoid those when looking for plausible deniability in case of compromise.)

+ +

However, some form of communication event must always occur, so steganography exploits various side-channels in order to embed additional concealed data. In order to thwart analysis of metadata, communicate through one or multiple uninvolved third parties as dead-drop, preferably such with broad distribution (like popular websites).

+ +

When relying on such third parties, steganography can help circumventing censors. If in adversary controls a critical link in the network and blocks all communications they can't inspect, you need to conceal your encrypted traffic inside of superficially innocuous traffic.

+ +
+
+
+
+ + +
+
+
+
+

Initial Setup

+

+ +

+	
+
+ +

+ +

+	
+
+ +

+ +

+	
+
+
+
+
+
+ +
+
+
+
+

Setup



+

+ +

+	
+
+ +

+ +

+	
+
+ +

+ +

+	
+
+ +
+
+
+
+ + + +
+
+
+
+

Setup



+

+

+	
+
+ +

+

+	
+
+ +

+

+	
+
+ +
+
+
+
+ + + +
+
+
+
+

Nihilism

+

+ Until there is Nothing left. + +

+
+ +
+

My Links

+

+ + RSS Feed
Matrix Chat
+ +

+
+ +
+

About nihilist

+

Donate XMR: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8


Contact: nihilist@nowhere.moe (PGP)

+
+ +
+ +
+
+ + + + + + +