New Program Makes It Even Easier To Hide & Access Information In Flickr Photos
from the ban-flickr! dept
The practice of hiding data in images -- known as steganography -- is nothing new. People have talked about it for ages, and we've long heard reports of how nefarious organizations used it all the time. But, of course, it can also be used for perfectly good reasons as well -- and now it may have just become a lot easier to use. Glyn Moody points us to the news of a new steganography program that is designed to work easily via Flickr, with the goal of getting news reports to various countries that try to censor the internet. The program, called Collage, supposed makes it quite easy to both encrypt and decrypt information in Flickr photos, knowing that Flickr -- unlike many news sites -- isn't often blocked in countries that censor the internet.Of course, once word of this program gets out, that could possibly change, but the programmers behind it say they can easily expand it to work with other photo sharing sites as well.
None of this is that surprising, really. In fact, my first reaction on hearing it was to think that this can't be new, as I'm pretty sure other offerings have already allowed such functionality with Flickr. However, it is a nice reminder that every time you try to censor the internet, there will be ways through, and that includes just masking the traffic you want blocked as legitimate traffic, such as Flickr photos.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: collage, easy, flickr, steganography
Reader Comments
Subscribe: RSS
View by: Time | Thread
http://en.wikipedia.org/wiki/File:Spectrogram_-_Aphex_Twin_-_Windowlicker.png
People can also use steganography to hide traffic inside traffic on the internet.
[ link to this | view in thread ]
[ link to this | view in thread ]
The Weakness of Steganography.
What the censorship in England during the Second World War did was to paraphrase telegram messages, across the board, in order to mess up codes. "Uncle Jim is sick" might become "Uncle James is ill." Of course the censorship could do this because various wartime restrictions were in effect. The government had taken over foreign trade, with a view to economizing on the limited supply of foreign exchange. A business in London was not allowed to buy things from New York, but had to go through a government agency. The result was that things like price lists, which have to be exact, were no longer being transmitted between businesses in different countries. The British government put together a single big order, and decided who got what out of it.
The way to hide messages in and out of a country is to bundle them in with the business communications. That way, the censor is at risk of messing up the country's export business.
[ link to this | view in thread ]
Re: The Weakness of Steganography.
Lossy signal is nothing new for communications, the only thing to do is either repeat the information in a number of places, such as a hidden hash in a 'free to download' program such as a flash game or repeat the signal in a number of pictures in a 'personal' or 'business' website.
The difficult trick, is getting the decryption information to the receivers on the other end, including 'where are the things to be decrypted found at.' Any method routinely used could be discovered, blocked or used to set traps for the end users with substituted information.
[ link to this | view in thread ]
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Hidden Audio Files on Flickr
[ link to this | view in thread ]
Could still be dangerous if the steganography is detectable
[ link to this | view in thread ]
Re:
my guess is for automation purposes, like a one click "stego and post" process, which would be different from sharing site to sharing site.
[ link to this | view in thread ]
Re: Could still be dangerous if the steganography is detectable
stego can be detected, all you have to do is look for extraneous data in an image file. the problem isn't that it's detectable, it's that services like flickr host billions of files that would have to be checked:
http://www.citi.umich.edu/u/provos/stego/
Once they know which pictures contain censored information they log any downloads of those images against the user's IP address and use that as information about who in their own population is reading it.
the thing with steganography is that you have to know where to look and then apply a method for extraction. if you have the target and extraction method ahead of time it's just a layer of inconvenience, like crypto. if you are an outsider sweeping for steganographic data, you are looking for a needle in a haystack which is potentially sitting in a stack of haystacks.
if you were to pair this tool with a bunch of compromised/colluding accounts, it would be very difficult to locate the party that is making these materials available. if these accounts are popular, it might also be difficult to locate the parties who are downloading these materials as well. a popular photographer may get thousands of hits per day on his/her photos, and if he/she has thousands of posted photos, it may not be apparent that a photo has been modified.
I would want the program to need the right key to even be able to detect that there is hidden material present before I used something like this.
stego isn't undetectable, nor is it unbreakable, but it does do a lot to obscure your activities. the point of stego is to put your payload out in the open. you are hiding your message in plain sight.
stego also pairs up nicely with crypto: you can embed encrypted data inside an file using steganography, so even if you can find the suspicious image(s), you may not necessarily get the payload.
[ link to this | view in thread ]
Just wait...
[ link to this | view in thread ]