this post was submitted on 22 Apr 2024
1 points (100.0% liked)
Europe
8484 readers
1 users here now
News/Interesting Stories/Beautiful Pictures from Europe 🇪🇺
(Current banner: Thunder mountain, Germany, 🇩🇪 ) Feel free to post submissions for banner pictures
Rules
(This list is obviously incomplete, but it will get expanded when necessary)
- Be nice to each other (e.g. No direct insults against each other);
- No racism, antisemitism, dehumanisation of minorities or glorification of National Socialism allowed;
- No posts linking to mis-information funded by foreign states or billionaires.
Also check out [email protected]
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
They will have tools to scan for steganography. I bet Palantir or some other dodgy tech bro company is more than happy to sell something like that to them. And with PGP's not only strong encryption, but just as strong authentication, they'll have no problem whatsoever proving that it was you who sent those illegal encrypted messages.
That's true. I guess that in this case, your best bet is (assuming you don't have something so illegal to hide, that they do want to expend large amount of resources on you) to just go security by obscurity, and have some kind of obscure custom steganography that's not widely used.
And for PGP - I though that there's a difference between signing and encrypting a message, and when you only encrypt and don't sign, they can't attribute the message to you, assuming they don't have your private key or the original plaintext? Or is it possible to attribute a encrypted message using only public key and cyphertext?