Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

1. How does it get sent to a black hat, the user was shown the recipient.

2. The whitespace steganography falls under a sanitization problem, but I concede that "hiding" messages can be a problem. Can't imagine the bandwidth being large at all, let alone encode your contacts and inbox.



1. What mathematical guarantees do you have that the recipient shown to the user was the actual recipient?

"Construct a routine whereby you ask a user permission to send an email to their boss, but instead you exfiltrate information unbeknownst to the user"




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: