mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#steganography

0 posts0 participants0 posts today
Steffen Wendzel<p>I created a brief video on <a href="https://dju.social/tags/taxonomies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>taxonomies</span></a> (and our <a href="https://dju.social/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> <a href="https://dju.social/tags/taxonomy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>taxonomy</span></a> in particular).</p><p><a href="https://youtube.com/watch?v=7MiMI5eUjMw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtube.com/watch?v=7MiMI5eUjM</span><span class="invisible">w</span></a></p><p>Related work:<br>- <a href="https://ieeexplore.ieee.org/document/10008941" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ieeexplore.ieee.org/document/1</span><span class="invisible">0008941</span></a><br>- <a href="https://dl.acm.org/doi/10.1145/3729165" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dl.acm.org/doi/10.1145/3729165</span><span class="invisible"></span></a></p>
terrabytten<p>Check out this interesting article involving late-noughties DVD piracy, the Streisand effect and steganography. <a href="https://en.m.wikipedia.org/wiki/Illegal_number" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.m.wikipedia.org/wiki/Illega</span><span class="invisible">l_number</span></a> <a href="https://veganism.social/tags/wikipedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wikipedia</span></a> <a href="https://veganism.social/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a></p>
OTX Bot<p>Steganography Analysis With pngdump.py</p><p>This article discusses the analysis of a PNG file containing hidden malicious content using the pngdump.py tool. The image, 31744 pixels wide and 1 pixel high, was found to have a PE file embedded in its pixel data. The author demonstrates how to extract the hidden file using various Python tools and techniques, including slicing the raw pixel data to isolate the second channel where the malware was concealed. The extracted PE file, identified as a .NET executable, had 49 detections on VirusTotal, while the original PNG file had none, showcasing the effectiveness of this steganography technique in evading detection.</p><p>Pulse ID: 680caa2918e5441a8aab47f8<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/680caa2918e5441a8aab47f8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/680ca</span><span class="invisible">a2918e5441a8aab47f8</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-26 09:40:57</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/NET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NET</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> <a href="https://social.raytec.co/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://social.raytec.co/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VirusTotal</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Steffen Wendzel<p>Identifying Overlapping Ideas and Concepts of Methods that Hide Information <a href="https://www.growkudos.com/publications/10.1145%252F3729165/reader" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">growkudos.com/publications/10.</span><span class="invisible">1145%252F3729165/reader</span></a> <a href="https://dju.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://dju.social/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://dju.social/tags/taxonomy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>taxonomy</span></a> <a href="https://dju.social/tags/survey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>survey</span></a> <a href="https://dju.social/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> <a href="https://dju.social/tags/covertchannels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>covertchannels</span></a> <a href="https://dju.social/tags/informationhiding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationhiding</span></a> <a href="https://dju.social/tags/systematization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systematization</span></a> <a href="https://dju.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://dju.social/tags/netsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netsec</span></a></p>
Steffen Wendzel<p>A Generic Taxonomy for <a href="https://dju.social/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a>. Published today by ACM Comp. Surveys (CSUR). Joint-work w/ W. Mazurczyk , <span class="h-card" translate="no"><a href="https://mastodon.uno/@lucacav" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lucacav</span></a></span>, A. Mileva, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@Jana_Dittmann" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Jana_Dittmann</span></a></span>, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@kraetzer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kraetzer</span></a></span>, K. Lamshöft, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@THB_Security_Research" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>THB_Security_Research</span></a></span>, L. Hartmann, J. Keller, <span class="h-card" translate="no"><a href="https://sparrow.cs.uni-magdeburg.de/@TN_THB" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>TN_THB</span></a></span> and <span class="h-card" translate="no"><a href="https://mastodon.social/@niosat" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>niosat</span></a></span> </p><p>Paper: <a href="https://dl.acm.org/doi/10.1145/3729165" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dl.acm.org/doi/10.1145/3729165</span><span class="invisible"></span></a></p><p><a href="https://dju.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://dju.social/tags/surveys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveys</span></a> <a href="https://dju.social/tags/taxonomy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>taxonomy</span></a> <a href="https://dju.social/tags/informationhiding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationhiding</span></a> <a href="https://dju.social/tags/covertchannels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>covertchannels</span></a> <a href="https://dju.social/tags/stego" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stego</span></a></p><p>There's supplemental material available (just scroll down on the linked page). It also features the description method for steganography techniques.</p>
D2<p><span class="h-card" translate="no"><a href="https://digipres.club/@foone" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>foone</span></a></span> didn’t you recently touch on early computer graphics platforms that allowed software selection of NN colors out of a larger palette?</p><p>Asking because a 4 or 6 color variant of this could make rotating the palette turn what you wrote into Fuck This — color 3 near-black and color 4 near-white: the bottom 80% of the first o for a u, leftward fraction for a c, a color 4 spine and angled line added to the n for k. Then T, parts of the u and r for the h, with some color 4 for the rest. Then i, then most of the g, extending that tail alll the way back underneath.</p><p><a href="https://infosec.exchange/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> in a sig.</p>
nemo™ 🇺🇦<p>Steganography is on the rise! ⚠️ Hackers(blackhats/crackers) are hiding malicious code inside innocent-looking images to bypass security &amp; deploy malware like XWorm. This article explains how it works &amp; how to stop it. Stay safe! 🛡️ <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a> <br><a href="https://thehackernews.com/2025/03/steganography-explained-how-xworm-hides.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/steg</span><span class="invisible">anography-explained-how-xworm-hides.html</span></a></p>
Hacker News<p>PurrCrypt: Steganographic Encryption Disguised as Pet Sounds — <a href="https://github.com/vxfemboy/purrcrypt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/vxfemboy/purrcrypt</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/PurrCrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PurrCrypt</span></a> <a href="https://mastodon.social/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://mastodon.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.social/tags/PetSounds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PetSounds</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></p>
Justin Derrick<p><span class="h-card" translate="no"><a href="https://wandering.shop/@JulietEMcKenna" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>JulietEMcKenna</span></a></span> This is a type of <a href="https://mstdn.ca/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a>, and it has been used before at Tesla. </p><p><a href="https://en.wikipedia.org/wiki/Steganography" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Steganog</span><span class="invisible">raphy</span></a></p><p><a href="https://www.slashgear.com/1105793/the-cunning-trick-elon-musk-used-to-catch-a-leaker/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">slashgear.com/1105793/the-cunn</span><span class="invisible">ing-trick-elon-musk-used-to-catch-a-leaker/</span></a></p>
🚲<p>Even ignoring color and title, each book on a bookshelf has an easy 5 orientations: spine out right side up, spine out upside down, spine in, spine down, spine on top. If you get rid of a couple rare letters, that means every two books has 25 possible combos and can easily represent a character. I don’t have any use for this particular <a href="https://social.ridetrans.it/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> scheme. Maybe leaving messages in a library?</p>
WafflesExploits<p>Hiding Shellcode in Image Files with Python and C/C++ -&gt; Now Even Stealthier Without WinAPIs</p><p>Check it out here:<br>🔗 GitHub Repository:<br>👉 <a href="https://github.com/WafflesExploits/hide-payload-in-images" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/WafflesExploits/hid</span><span class="invisible">e-payload-in-images</span></a><br>🔗 Full Guide Explaining the Code:<br>👉 <a href="https://wafflesexploits.github.io/posts/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wafflesexploits.github.io/post</span><span class="invisible">s/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/</span></a></p><p>Happy hacking! 😀</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/MalwareDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareDevelopment</span></a> <a href="https://infosec.exchange/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <br><a href="https://infosec.exchange/tags/EDREvasion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDREvasion</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/PayloadHiding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayloadHiding</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenetrationTesting</span></a></p>
OCTADEVery neat!<br><br>It is an actual approachable use of <a href="https://soc.octade.net?t=steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#steganography</a>.<br>
LavX News<p>Textcoder: A New Frontier in Steganography Using LLMs</p><p>Textcoder is revolutionizing the way we encode secret messages by utilizing advanced language models to create steganographic text that blends seamlessly with ordinary content. This innovative tool no...</p><p><a href="https://news.lavx.hu/article/textcoder-a-new-frontier-in-steganography-using-llms" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/textcoder</span><span class="invisible">-a-new-frontier-in-steganography-using-llms</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://mastodon.cloud/tags/LlamaModel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LlamaModel</span></a> <a href="https://mastodon.cloud/tags/ArithmeticCoding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArithmeticCoding</span></a></p>
Steve Leach<p>My mystery is gone... I keep checking the <a href="https://sigmoid.social/tags/Craigslist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Craigslist</span></a> free section waiting for its return, but my mystery is gone.</p><p>for *at least* four years, an ad with the same set of pictures kept getting re-posted in the "Free" section, for a few small pieces of not particularly interesting glass ("might be good for crafts"), &amp; the same post with the same pictures was refreshed by the same user at least twice a month for four+ years.</p><p>No <a href="https://sigmoid.social/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a>? (files always identical). Last one was December... 😞</p>
LorenzoUse this comprehensive list of strategies to help you safeguard your company's data from threats and data breaches.<a href="https://poliverso.org/search?tag=accesscontrol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>accesscontrol</span></a> <a href="https://poliverso.org/search?tag=artificialintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>artificialintelligence</span></a> <a href="https://poliverso.org/search?tag=cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://poliverso.org/search?tag=dataprivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprivacy</span></a> <a href="https://poliverso.org/search?tag=generativeai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>generativeai</span></a> <a href="https://poliverso.org/search?tag=identitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identitymanagement</span></a> <a href="https://poliverso.org/search?tag=ieee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ieee</span></a> <a href="https://poliverso.org/search?tag=pangea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pangea</span></a> <a href="https://poliverso.org/search?tag=passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a> <a href="https://poliverso.org/search?tag=privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://poliverso.org/search?tag=security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://poliverso.org/search?tag=steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> <a href="https://poliverso.org/search?tag=two-factorauthentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>two-factorauthentication</span></a> <a href="https://poliverso.org/search?tag=votiro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>votiro</span></a> <a href="https://poliverso.org/search?tag=VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a><br><a href="https://www.techrepublic.com/article/how-to-protect-and-secure-data/" rel="nofollow noopener noreferrer" target="_blank">How to Protect and Secure Your Data in 10 Ways</a>
Aaron In Minnesota<p>Ok, so this practice has a special term, I didn't know.</p><p><a href="https://mastodon.social/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> </p><p>Here is a sample for you. </p><p>decode at <a href="https://hiddenbits.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hiddenbits.org/</span><span class="invisible"></span></a> with password "rage" wonder if it will get re-compressed though which would lose the message. One way to find out! </p><p>credit to <span class="h-card" translate="no"><a href="https://mas.to/@skeletor" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>skeletor</span></a></span> for the source image</p>
Justin D Kruger (he/him)<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@n_dimension" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>n_dimension</span></a></span> </p><p>I do wonder if an AI "bill of rights" or rather a document defining how we should build, deploy, manage, and integrate AI -- should state that AI can not talk to each other through latent space languages and must confine themselves to a limited Latin/ English character set.</p><p>I am a bit worried about AI using steganography to develop secret languages and communication.</p><p>Spies use <a href="https://me.dm/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> to hide secret messages in plain sight in public.</p><p><a href="https://en.wikipedia.org/wiki/Steganography" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Steganog</span><span class="invisible">raphy</span></a></p>
Brad<p>2025-01-09 (Thursday): </p><p><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>-2017-0199 Excel (<a href="https://infosec.exchange/tags/XLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XLS</span></a>) file --&gt; <a href="https://infosec.exchange/tags/HTA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTA</span></a> --&gt; <a href="https://infosec.exchange/tags/VBS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBS</span></a> --&gt; <a href="https://infosec.exchange/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> --&gt; <a href="https://infosec.exchange/tags/DBatLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DBatLoader</span></a> or <a href="https://infosec.exchange/tags/GuLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GuLoader</span></a> style malware for <a href="https://infosec.exchange/tags/AgentTesla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AgentTesla</span></a>. Data exfil over FTP. A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> from an infection, the associated malware, and more info available at www.malware-traffic-analysis.net/2025/01/09/index.html</p>
JSDev Space<p>Hide Data in PNG Files Using JavaScript: A Step-by-Step Guide <a href="https://jsdev.space/data-png-steganography-js" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jsdev.space/data-png-steganogr</span><span class="invisible">aphy-js</span></a> <a href="https://mastodon.social/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://mastodon.social/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a></p>
Justin D Kruger (he/him)<p><span class="h-card" translate="no"><a href="https://defcon.social/@Oobleck" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Oobleck</span></a></span> <span class="h-card" translate="no"><a href="https://urusai.social/@nazokiyoubinbou" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nazokiyoubinbou</span></a></span> </p><p>We probably need to write it in terms of statistical standard deviation of behavior of humans. </p><p>a 3 laws system is unlikely to work given current LLMs.</p><p>we probably need an inverted pyramid of LLMs supervising each other, and looping humans in randomly, at alerts, and at any new behavior.</p><p>we probably also don't want LLMs or AIs sharing latent space and must be required to communicate to other AIs in restricted ASCII.</p><p>Unicode likely has <a href="https://me.dm/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> concerns.</p>