TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

DissidentX – Censorship resistance tool by Bram Cohen

222 pointsby edwincheeseover 11 years ago

15 comments

sillysaurus2over 11 years ago
Judging by the claims and the code, this is a tool created by someone who hasn&#x27;t read any prior research about steganography. If you trust this, don&#x27;t be surprised when law enforcement detects that you&#x27;re using it.<p>I&#x27;m surprised to see someone of Bram Cohen&#x27;s caliber releasing something like this. No one has any business coding security tools unless they&#x27;ve taken time to read forensics whitepapers to look for reasons why their tool won&#x27;t work. And this tool certainly won&#x27;t work.<p>The goal of steganography is to hide the fact that you&#x27;ve transmitted messages. The longer the message, the harder that becomes. This may be suitable for hiding a few bytes, but no useful message is going to be a few bytes, unless it&#x27;s something like a decryption key (and hiding a decryption key using stego would be crazy). This doesn&#x27;t solve the problem of &quot;law enforcement wants to know what your decryption keys are, because they&#x27;ve detected you&#x27;re encrypting data.&quot; The whole point of stego is to avoid that scenario.<p>Anyone who&#x27;s interested in steganography should start here: <a href="http://www.cl.cam.ac.uk/~rja14/Papers/jsac98-limsteg.pdf" rel="nofollow">http:&#x2F;&#x2F;www.cl.cam.ac.uk&#x2F;~rja14&#x2F;Papers&#x2F;jsac98-limsteg.pdf</a> ... No one who reads that whitepaper and understands its implications would take this tool seriously.<p>EDIT: To clarify: a message as short as ~50 bytes can often be detected, depending on the stego implementation, because even that is enough to cause statistical anomalies in the covertext which indicates that an encrypted message is hidden in the covertext. So I&#x27;m not talking about detecting images or videos sent via stego; just encrypted plaintext messages.
评论 #6843990 未加载
评论 #6844224 未加载
评论 #6843792 未加载
评论 #6843830 未加载
stuartcwover 11 years ago
Here&#x27;s another fun steganographic tool: <a href="http://www.spammimic.com" rel="nofollow">http:&#x2F;&#x2F;www.spammimic.com</a><p>Hide messages in SPAM Text:<p>Dear Decision maker , We know you are interested in receiving amazing intelligence . This is a one time mailing there is no need to request removal if you won&#x27;t want any more . This mail is being sent in compliance with Senate bill 1625 ; Title 4 ; Section 302 . THIS IS NOT MULTI-LEVEL MARKETING ! Why work for somebody else when you can become rich as few as 33 days . Have you ever noticed people love convenience and more people than ever are surfing the web ! Well, now is your chance to capitalize on this ! WE will help YOU decrease perceived waiting time by 190% and increase customer response by 150% . You can begin at absolutely no cost to you . But don&#x27;t believe us . Ms Ames of Washington tried us and says &quot;I was skeptical but it worked for me&quot; . We assure you that we operate within all applicable laws . We implore you - act now ! Sign up a friend and you get half off . God Bless !
评论 #6844191 未加载
tsaoutourpantsover 11 years ago
Stenography is one of the NSA&#x27;s worst nightmares. Encrypted strings sent over the Internet they know are encrypted, and often know what algorithm and key length. But the fact that any image can contain an encrypted message, and there&#x27;s know way to know whether or not something exists within, scares the shit out of them.<p>So, good work.
评论 #6843524 未加载
评论 #6843478 未加载
评论 #6843441 未加载
评论 #6845257 未加载
preech99over 11 years ago
I am going to port this to ruby. I&#x27;m currently unemployed and it should be a good sample to share with potential employers.
tokenroveover 11 years ago
I would have liked to have seen some references to the research in the field in the explanation or comments. I wrote something like this around 15 years ago (<a href="https://github.com/tokenrove/steaghan/;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;tokenrove&#x2F;steaghan&#x2F;;</a> horribly broken, do not use) but quickly abandoned it when Niels Provos started doing much more sophisticated stuff (<a href="http://www.citi.umich.edu/u/provos/stego/" rel="nofollow">http:&#x2F;&#x2F;www.citi.umich.edu&#x2F;u&#x2F;provos&#x2F;stego&#x2F;</a>).<p>Since then, there has been a fair bit of really interesting research in the field; I recommend anyone interested read Peter Wayner&#x27;s book Disappearing Cryptography. Might be a good place to start for enhancing this provocatively named framework.
评论 #6844544 未加载
swordswinger12over 11 years ago
I feel like this is a good place to mention a similar project which aims to circumvent deep-packet inspection with some cool encoding techniques. It can even be used as a Tor plugin!<p><a href="https://github.com/kpdyer/fteproxy" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;kpdyer&#x2F;fteproxy</a> <a href="https://fteproxy.org/" rel="nofollow">https:&#x2F;&#x2F;fteproxy.org&#x2F;</a>
pretzover 11 years ago
<i></i>Q. Why did you use Python3 as a reference language?<i></i><p><i></i>A. Because not having distinct binary and unicode string types is barbaric.<i></i><p>Well played.
dublinbenover 11 years ago
This isn&#x27;t really a &quot;censorship resistance&quot; tool as it is a steganography tool. You can still be censored if your internet access is cut, or you have no way to publish your message.
评论 #6843438 未加载
radikalusover 11 years ago
It&#x27;s been a long time since I&#x27;ve done work in infosec related things, so I apologize if I&#x27;m way behind on...things.<p>I remember in school a million years ago we discussed an algorithm of the following type for sending short covert messages.<p>1. Negotiate cipher&#x2F;mapping for where to look for hidden information 2. A wants to send B message &quot;Let&#x27;s get drinks @ 9 @ Bill&#x27;s&quot; -- instead of inserting this into some random file, he instead maps to the cipher&#x2F;mapping area and then iteratively searches for images&#x2F;texts that are closest possible matches in those bits to his message. 3. Ideally, given access to enough cover files and a short enough message, he has an EXACT match. A sends B picture of puppies with NO bit twiddling. B knows to meet at the pub.
estover 11 years ago
We don&#x27;t need yet another steganography tool based on texts, we need a steganography tool to scramble data into a pile a fucked up HTML DOM tree.
blueblobover 11 years ago
I love the question in the FAQ:<p><pre><code> Q. Why can&#x27;t it be given more than two alternates for one position to encode more information? A. Because of math. See Explanation.txt for a bit more detail. </code></pre> <i>Because of math</i> hilarious
评论 #6843930 未加载
eliteraspberrieover 11 years ago
Steganography has a bad reputation because the only tools publicly available are worthless. Not one is both secure according to Kerckhoffs&#x27;s principle and secure against statistical analysis. I hope to change that by releasing an implementation of a new algorithm I have developed, sometime in the new year. If you are interested in reviewing the algorithm and code when it is released, feel free to follow my blog.
DanBCover 11 years ago
Has anyone sensible done any kind of analysis of this?
评论 #6843445 未加载
tostitos1979over 11 years ago
This is from a few months ago. Still neat :)
xdissentover 11 years ago
I like the name!