Termin:Chaotic-Congress-Cinema Nr. 17Aus Attraktor WikiVersion vom 29. April 2011, 14:06 Uhr von Muelli (Diskussion | Beiträge)
Chaotic-Congress-Cinema Nr. 17
Wir schauen uns die Aufzeichnung von Congress Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-) Weitere Informationen unter Chaotic Congress Cinema.
Secure communications below the hearing thresholdImproved approaches for auditive steganography Auditive steganography allows for various usage scenarios. In our project we focused on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in realtime. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms. The need for steganography has arisen from scenarios that forbid the application of cryptographic algorithms for secure communications. Countries that made secret message exchange a delict are an example for such scenarios. The LSB algorithm used by many open- and closed- source projects is insecure, as its application can be statistically detected. Therefore, we focused on alternate approaches which are more robust against operations on the bit-level, such as compression, D/A-, A/D-conversion and channel idiosyncrasies, such as spread spectrum steganography in time and frequency domain. Secure and hidden communications demand more than an embedding algorithm. Involved elements include:
This talk gives an introduction to the topic and describes the development and implementation of our framework based on a novel layered model for auditive steganography including a live demonstration.
http://events.ccc.de/congress/2010/Fahrplan/events/4138.en.html
Contemporary Profiling of Web UsersOn Using Anonymizers and Still Get Fucked This talk will provide a summary of recently discovered methods which allow to break the Internet's privacy and anonymity. We will show, amongst others:
provide crawlers with false data or lure them into tar pits.
networks.
http://events.ccc.de/congress/2010/Fahrplan/events/4140.en.html http://ftp.ccc.de/congress/27C3/mp4-h264-HQ/27c3-4140-en-contemporary_profiling_of_web_users.mp4 |