{"id":575,"date":"2009-03-04T22:09:01","date_gmt":"2009-03-05T02:09:01","guid":{"rendered":"http:\/\/cd34.com\/blog\/?p=575"},"modified":"2009-03-04T22:09:01","modified_gmt":"2009-03-05T02:09:01","slug":"hiding-data-in-plain-sight","status":"publish","type":"post","link":"https:\/\/cd34.com\/blog\/boring\/hiding-data-in-plain-sight\/","title":{"rendered":"Hiding Data in Plain Sight"},"content":{"rendered":"<p>I had a breakfast meeting today with a company involved in forensic reconstruction of data after a possible crime had been committed.\u00a0 Somehow the conversation shifted slightly and we talked about the process and one of the people said, &#8220;You know, it wouldn&#8217;t be so bad if we didn&#8217;t have to wade through all that spam and not find anything worthwhile in the email messages that showed how the person communicated.&#8221;<\/p>\n<p>At this point I said, have you ever thought that they could be using <a href=\"http:\/\/www.spammimic.com\/\">Spam Steganography<\/a>?\u00a0 Eyebrows were raised, the conversation paused and I was met with a blank stare for about 30 seconds.<\/p>\n<p>The assumption is that encrypted data needs to look like encrypted data or a string of numbers and letters that are unintelligable.\u00a0 While this system doesn&#8217;t really produce well hidden data, the premise is valid.<\/p>\n<blockquote><p>Dear Friend ; Thank-you for your interest in our publication<br \/>\n. If you no longer wish to receive our publications<br \/>\nsimply reply with a Subject: of &#8220;REMOVE&#8221; and you will<br \/>\nimmediately be removed from our club ! This mail is<br \/>\nbeing sent in compliance with Senate bill 1816 ; Title<br \/>\n3 ; Section 304 . This is not multi-level marketing<br \/>\n. Why work for somebody else when you can become rich<br \/>\nwithin 45 days . Have you ever noticed more people<br \/>\nthan ever are surfing the web &amp; people love convenience<br \/>\n! Well, now is your chance to capitalize on this .<br \/>\nWe will help you SELL MORE and use credit cards on<br \/>\nyour website . You are guaranteed to succeed because<br \/>\nwe take all the risk ! But don&#8217;t believe us ! Ms Ames<br \/>\nof Montana tried us and says &#8220;I was skeptical but it<br \/>\nworked for me&#8221; ! We are licensed to operate in all<br \/>\nstates . We implore you &#8211; act now . Sign up a friend<br \/>\nand you&#8217;ll get a discount of 80% ! Best regards . Dear<br \/>\nE-Commerce professional , Especially for you &#8211; this<br \/>\nbreath-taking news . We will comply with all removal<br \/>\nrequests . This mail is being sent in compliance with<br \/>\nSenate bill 1626 ; Title 1 ; Section 301 . This is<br \/>\ndifferent than anything else you&#8217;ve seen ! Why work<br \/>\nfor somebody else when you can become rich in 38 weeks<br \/>\n. Have you ever noticed most everyone has a cellphone<br \/>\nplus people love convenience ! Well, now is your chance<br \/>\nto capitalize on this . We will help you decrease perceived<br \/>\nwaiting time by 200% plus use credit cards on your<br \/>\nwebsite ! You are guaranteed to succeed because we<br \/>\ntake all the risk . But don&#8217;t believe us . Mr Jones<br \/>\nof Georgia tried us and says &#8220;Now I&#8217;m rich many more<br \/>\nthings are possible&#8221; ! This offer is 100% legal ! So<br \/>\nmake yourself rich now by ordering immediately ! Sign<br \/>\nup a friend and you&#8217;ll get a discount of 60% . Best<br \/>\nregards !<\/p><\/blockquote>\n<p>The above message decodes to: <strong>This is a test message<\/strong><\/p>\n<p>I now wonder if they will be redoing that investigation looking for stegonagraphically encoded spam.<\/p>\n<div style=\"float:left;\">\n<div id=\"fb-root\"><\/div>\n<fb:like href=\"https:\/\/cd34.com\/blog\/boring\/hiding-data-in-plain-sight\/\" width=\"250\" send=\"false\" show_faces=\"false\" layout=\"button_count\" action=\"recommend\"><\/fb:like>\n<\/div><div style=\"clear:both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>I had a breakfast meeting today with a company involved in forensic reconstruction of data after a possible crime had been committed.\u00a0 Somehow the conversation shifted slightly and we talked about the process and one of the people said, &#8220;You know, it wouldn&#8217;t be so bad if we didn&#8217;t have to wade through all that [&hellip;]<\/p>\n<div style=\"float:left;\">\n<div id=\"fb-root\"><\/div>\n<fb:like href=\"https:\/\/cd34.com\/blog\/boring\/hiding-data-in-plain-sight\/\" width=\"250\" send=\"false\" show_faces=\"false\" layout=\"button_count\" action=\"recommend\"><\/fb:like>\n<\/div><div style=\"clear:both;\"><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[15,14],"class_list":["post-575","post","type-post","status-publish","format-standard","hentry","category-boring","tag-spam","tag-stegonagraphy"],"_links":{"self":[{"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/posts\/575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":1,"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/posts\/575\/revisions"}],"predecessor-version":[{"id":576,"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/posts\/575\/revisions\/576"}],"wp:attachment":[{"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/categories?post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cd34.com\/blog\/wp-json\/wp\/v2\/tags?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}