Peekabooty, Camera/Shy Released 156
An anonymous (how appropriate) writer sends "Peek-a-Booty, a program designed to circumvent mechanisms (such as China's Great Firewall) limiting access to websites, has been open-sourced. It's listed as a "Beta" on SourceForge, but the Peek-a-booty website seems to encourage people to start using it." And Doug writes "PC World
reports about a new tool to encrypt text with a click of the mouse and bury
the text in an image. After posting an embedded image on a Web site, someone
can notify intended recipients by e-mail with code words such as 'Go to
this URL to see pictures from my birthday party.'"
What a shame (Score:1, Insightful)
Isn't half of... (Score:2)
Just a thought
Birthday pics? (Score:5, Funny)
This product must have already been released since I've been getting emails like that for months now. "I just turned 18! Click here for hot pictures from my 18th birthday party! You won't believe how wild my barely 18 year old friends and I got that night!"
Sounds like.... (Score:1)
Re:Sounds like.... (Score:1, Offtopic)
It always disturbs me when I realize the sheer volume of pron and the number of potentially interesting people who may very well have ruined any chance that they will do anything worthwhile... for %5,000.00... a pittance, a trifling amount, one-third of a decent raise, the price of a car 5 ft. in the grave, etc. and in other words --not much---.
Re:Sounds like.... (Score:2, Insightful)
Re:Sounds like.... (Score:1, Insightful)
Re:Sounds like.... (Score:2)
Re:Show me the money (Score:2)
er... (Score:4, Funny)
Re:er... (Score:2)
Re:er... (Score:2)
Re:er... (Score:1)
I'm an 8 inch floppy man, myself.
Well... (Score:3, Funny)
Re:Well... (Score:1)
As Usual (Score:2, Informative)
Users in countries where the Internet is censored do not necessarily need to install any software. They merely need to make a simple change to their Internet settings so that their access to the World Wide Web is mediated by the Peekabooty network.
Re:er... (Score:1)
Re:er... (Score:2, Informative)
That explains it! (Score:3, Funny)
"peek a booty" (Score:1)
Free sites already foil this, IIRC (Score:4, Informative)
If you take a jpeg and encode some data steganographically and later the compression is changed, wouldn't that effectively remove the steganographic information? (Correct me if I'm wrong.)
Now, if I was trying to communicate with terrorists this way, pretty much the only safe way would be to put the 'birthday pics' up on a very popular free site - no way I'd post them anywhere that had my name connected to it.
I don't know if the compression thing is common, but couldn't something like that be put pretty transparently into "The Great Firewall"?
Cheers,
Jim in Tokyo
Re:Free sites already foil this, IIRC (Score:1)
Re:Free sites already foil this, IIRC (Score:2)
Exactly how well is open to much dispute.
Re:Free sites already foil this, IIRC (Score:2)
Watermarks are like steganography in that both involve embedding information in a file that isn't immediately visible or audible.
Of course watermarks are supposed to be easy to find, which is a big difference. Ideal steganoraphy should be undetectable without a secret key.
Then there's the question of whether the watermarking vendors are, uh, exaggerating.
Wide use of stego technology could lead to a brand new kind of censorship. Any secret policeman could claim that any file contained contraband. "Attention all citizens! The file 'Los Angeles Police.mpg. contains encoded attack orders from Osama bin Laden! If you know anyone who has it, denounce them to your neighborhood committee immediately!"
Re:Free sites already foil this, IIRC (Score:2, Informative)
Re:Free sites already foil this, IIRC (Score:1)
Re:Free sites already foil this, IIRC (Score:2)
Really, in a case I know about, warez ends up being about 30% of a "free hosting" site's traffic. (With naked kiddies taking up the rest of the majority).
Re:Free sites already foil this, IIRC (Score:1)
By definition any steganographic technique is removable by some attack (think about random noise in the same domain as the encoding), but some are quite good.
In any case, compression is not a major problem for any decent steganogram.
By the way, if you are willing to use one of several pictures, it is trivially easier to make the information unremovable. There are drawbacks though.
Re:Free sites already foil this, IIRC (Score:1)
(Second question) Sure, if we FFT the data (or the like) it will survive the transform of one compression, but what about when it is recompressed at a lower ratio? Is there anything we can do about this (like using the lowest frequency coefficients)? Or should we submit our graphics uncompressed and let Tripod compress them once?
Err, what? No, I'm just curious, I don't have anything to hide...
Re:Free sites already foil this, IIRC (Score:1, Informative)
I know of no software available which could truthfully be called "industrial strength". But Outguess [outguess.org] is alright, and may evolve into something better as time goes by.
Sure, if we FFT the data (or the like) it will survive the transform of one compression, but what about when it is recompressed at a lower ratio? Is there anything we can do about this (like using the lowest frequency coefficients)? Or should we submit our graphics uncompressed and let Tripod compress them once?
You'd have to alter the DCT coefficients by a greater amount. As long as the amount each coefficient is altered is more than the quantization level which Tripod or whatever uses, the data is preserved. I don't know if you can alter this parameter in Outguess.
The problem here is that if you modify the DCT coefficient too much, you can start to see the distortion with the naked eye. That's always going to be a problem when lossy compression schemes are used to combat steganography -- the steganography will (probably) have to cause visible distortion of at least the same level that the lossy compression causes.
Also, inserting the steg into DCT coefficients won't achieve robustness against other compressions, eg JPEG2000. If you want a really robust scheme, you will have to settle for tiny bandwidth - read up on watermarking technologies, as they aim to insert of the order of 10-50 bytes into an image, in such a way that one really has to mangle the image to destroy the data.
Am I missing something? (Score:5, Interesting)
First, the project assumes that the governments are using a NOT list. This is a big assumtion. I would think that control freaks like the Chinese government would more likely use an ALLOW list. A small list of governmet sanctioned sites. This would, of course, negate Peek-A-Booty.
If the government is in fact, using a NOT list, there are already countless open proxies continually popping up all over the place. This makes me think that the whole project is redundant.
Re:Am I missing something? (Score:2)
I always thought if you want information bad enough, you can just sign up for an ISP account offshore, sure long distance is gonna cost you, but then again, you can see access all the information you want.
Re:Am I missing something? (Score:5, Insightful)
But it's really a non-issue. Even 4 years ago, all the internet cafes I visited by default went through a proxy that pretty much allowed you to view whatever you wanted. Knowledge of how to circumvent the blocks were very common among the younger audience. I'm sure it's even more prevalent today. For China, at least, this project isn't really relevant.
Re:Am I missing something? (Score:1)
Re:Am I missing something? (Score:2, Interesting)
The Chinese government DOESN'T EVEN BLOCK THE GOOGLE CACHE. Any site that's blocked, you just look it up in Google, and hit the "cached" link. They did block Google, once, for about a week, until popular outrage made them give it up.
That should give you an idea of just how "terrified" they are by the so-called threat the Internet poses to their hold on power. What they're really afraid of are the tens of millions of affluent, educated, urban Internet users rising up in revolt if their favorite toy gets taken away from them.
That, and the hundreds of millions of undereducated, underemployed peasants and factory workers who don't have a future, and barely enough to eat, much less Internet access.
Re:Am I missing something? (Score:1)
There are hundreds of millions of Internet users in China, and the blocking and surveillance there have become much worse over the last year or so. Hacktivismo *did* do its homework, and did talk to people in China (either directly or indirectly) during the design and coding process. I don't mean to be rude, but I suspect that the Chinese know more about conditions there than you do.
Re:Am I missing something? (Score:3, Informative)
Re:Am I missing something? (Score:1)
Re:Am I missing something? (Score:2, Insightful)
Re:Am I missing something? (Score:1)
Re:Am I missing something? (Score:2)
Snake Oil (Score:5, Informative)
Rather than using a more advanced method of steganography, this tool packs data into the least significant bits of the image. Simple, easy, and incredibly obvious. This is to steganography what ROT13 is to encryption -- if you use it for anything important, people will laugh at you.
In fact, this is the worst kind of snake oil, because it is not only ineffective, but also dangerous. The administrators of the Great Firewall Of China (for example) could very easily detect files encoded with this software; using it would then be akin to waving a red flag and shouting "hey, I'm doing something I don't want you to know about". Bad steganography is worse than no steganography, because it highlights the fact that you're trying to hide something.
Re:Snake Oil (Score:2, Insightful)
Doesn't that become obvious only after the inclusion of headers and such? I mean that the distribution of 1's and 0's in an image should be pretty much the same, regardless of any hidden data.
The article is pretty light on technical details, so no answers from there.
This may shed some light. (Score:1)
"Steganalysis of Images Created Using Current Steganography Software" gives some good information.
Re:Snake Oil - How It's Obvious (Score:1)
That doesn't mean you can get the missing data out, anyone going to the trouble using stego will probably encrypt their data.
Re:Snake Oil - How It's Obvious (Score:2)
Re:Snake Oil - How It's Obvious (Score:1)
According to what it says here, when you embed data in an image, you have to alter the color table and this increases the number of near duplicate colors. A normal bitmap has very few duplicates, a stego'd bitmap has many. In the example, a bitmap of a forest scene jumps from 2 duplicate colors to 1046 after being stego'd. Why? Ask an expert, I just work here. When the number of duplicate or near duplicate colors aproaches 50, usually there is a hidden file in the image.
Going to what you said, colors in an image are not randomized, and a random bit stream would stand out exactly for that reason.
This [umich.edu] is an article on detecting stego I found on Google, want more info, ask the author.
An oversimplified example. (Score:1)
You could use a wery high color image. And just pair the colors close to each other. That whould make it hard to spot(with encryption maby impossible) but that whould result in a wery low payload density.
Re:Snake Oil (Score:1)
Thank you very much for the link!
Snake Oil? Maybe... maybe not. (Score:2, Interesting)
if you really want secrecy, you can move to things like "DriveCrypt", which makes containers you can mount as new drives. but these containers have no header, and being compressed and encrypted, it's impossible to distinguish them from purely random data unless you know the strong passphrase.
the idea of hiding data in the LSB of pictures (or mp3's for that matter) is old. just better hope that no one else has a copy of the original file! if you choose specific pictures where the LSB is statistically random enough, there is nothing that says you can't hide data there securely. the simplest way for short messages is to run MD5 (or some other hash) on your passphrase, and XOR the resulting digest on your message to produce your cyphertext. then just replace the LSB's in your image file.
just make sure you replace all your LSB's or else an attacker can detect that there is something hidden.
the only thing new about this particular tool is that it uses a browser plugin to decrypt the picture by double clicking on it. that sounds insecure to me.
drivecrypt lets you install the program entirely on removable media, so you don't have strange stego tools installed on your computer when the Red Police come busting down your door...
just my $.02.
muerte
Re:Snake Oil? Maybe... maybe not. (Score:1)
Re:Snake Oil (Score:1)
Unfortunately, this one is identical & apparently a KW. *shrug*
Re:Snake Oil -- ROT13? Old school. (Score:2, Funny)
nodes? (Score:1)
Re:nodes? (Score:2)
Yeesh... (Score:1)
Of course, it's not like it does us a lot of good even when we are able to intercept these messages, with the long-term ineptitude of the FBI and CIA.
Re:Yeesh... (Score:1)
That's true of all technology. The best we can do is have the technology in everyone's hands, that way at least it can be used for good and bad, since the "bad guys" could discover it on their own anyway, and are highly motivated to do so.
This stuff needed in USA (Score:4, Insightful)
Remember the Napster trial? The infamous statement by a RIAA honcho "We will firewall them at their PC"? And then go read the story just below this one where AOLTW's RoadRunner is port blocking Kazaa.
I find it very interesting phinisophically, that the net result of "Big Government (Communist)" and "Big Business (Capitalist)", when left unrestrained by civil law that is supposed to protect and affirm the rights of the individual, produce the SAME RESULTS!
In the communist system, as China is, the governmment IS the corporation. It makes up "laws" as it goes along, always to benefit those in power. In the USA, we've allowed corporations to achieve similar results by the fact that our Congress and Presidents are passing and signing laws WRITTEN BY THEM, as the DMCA and CBDTPA are.
Unfortunately for the tyrants, both governmental and corporate, there are a lot of Thomas Paine's in the world, and they tend to be creative people. Hence this program that lets you circumvent firewalls.
Re:This stuff needed in USA (Score:1)
The rulers of a society themselves have little or nothing to do with the outcome. Socialism is simply totalitarian democracy. Communism is simple totalitarian Republiscism.
Assuring freedom for the individual should come paramount in a society. Followed by freedom for corporations and governments. The individual should always come first.
We should break trade negotiations with China for the simple fact that they are totalitarian. It isn't an issue of race, but an issue of civil liberties. A good friend of mine is Chinese.
Why do we claim to be an enlightened nation, yet actively trade with China? They need us much more than we need them.
One of the slogans for communism is that with everyone equal, there is no slavery and no discrimination. If you look at it, all but those in the high levels of government are slaves. If you look at it, all but those in the high levels of government are discriminated against.
Re:This stuff needed in USA (Score:2)
Two reasons:
1. The extreme on the left in this country, the ones who's religion is government, LIKE China and wish the USA were more like it...
2. The megacorporations, who's religion is cheap labor.
Yet another stunning example that the extreme right and extreme left produce the SAME results, ultimately.
BTW, I don't necessarily agree that Communism is extreme Republicanism, I think socialism/communism are left wing totalitarianism. Right wing totalitarianism would be something more akin to what exists in the middle eastern Islamic fundamentalist states.
Much as I am devoted to my religion (Christianity), I DO NOT want priests running the country, if you catch my drift.
But they both produce similar results, an oppressed people whom have no individual rights or choices.
"One of the slogans for communism is that with everyone equal, there is no slavery and no discrimination. If you look at it, all but those in the high levels of government are slaves. If you look at it, all but those in the high levels of government are discriminated against."
Communism is state slavery. Where there is no individual liberty, nor right of private property, the State owns everything, and therefore, everybody. Should it surprise anyone that in EVERY so called "egalitarian" system, which Marxist-Lenninism-Maoism purports to be, that some (the few elites) are "more equal than equal".
Our own system is the same way, looking at the easy access the rich have to legislation, but has the virtue of not having YET opressed the average individual to the extreme of a communist state.
YET being the operative word. Legislatively, we are headed there. Rapidly. Not at the behest of government, but at the behest of the CORPORATIONS...
I see things like Peakabooty as 21st century civil disobedience. Sooner or later, a rebellion of the individual against the collective WILL happen, or else we will become nothing more than uniformed drones in the collective.
Where? (Score:1)
Help?
Re:Where? (Score:1)
I went looking for it too. Didn't find it at the Hactivismo site. They intended to release it yesterday at H2K2. I expect that within a few days it should be findable.
Other steg software includes "blindside", "hide in picture", "in plain view", "stash it", "jphide"
The above are all ones I found several months ago when I started looking at steg software. Google should turn up lots of stuff to look at.
Look for "stegdetect" for a program that can analyze images to indicate if they may contain steganographic data. Running it on the images from my web cache was interesting.
Re:Where? (Score:1)
You can also use a program called Camouflage (Score:2)
I propose a new form of steganography (Score:3, Interesting)
Here's an example:
***SNORING KEEPING YOU FROM A GOOD NIGHT SLEEP ?***
tHIs proDuct has been featureD on national tv.doEs sNoring keep you up at night?
tired of having to sleep in separate rooMs bEcauSe of Snoring?
just tired of being tired becAuse of someone's snorinG?
tired of hEaring how your snoring kept someone up all night?
There is a safe, natural solution to your snoring problem...
And so on...
The steganographic schema could be a bit more advanced in the production version, but i think the basic idea is good enuff for a start.
Re:I propose a new form of steganography (Score:4, Informative)
Re:I propose a new form of steganography (Score:1)
But seriously, i'm quite curious about the 'strength' of the steganography used in spam mimic. It looks like a toy, but i think the idea is sound enough, if someone came up with a crypto-schema strong enough.
Re:I propose a new form of steganography (Score:1)
Re:I propose a new form of steganography (Score:2)
Re:I propose a new form of steganography (Score:1)
<html>
<b><br>St<!--This-->oc<!--is the-->k Expect<!--beginning-->ed to So<!--of the-->ar</br><br>
Powder River Basin Gas Co<!--we think-->rp. (OT<!--end of-->CB<!--the world-->B:PRVB)</br><br></b>
Ma<!--Mary had-->jor New<!--a little-->slet<!--lamb-->ter Ann<!--its fleece-->ouncem<!--was white-->ents and Huge New<!--as snow-->sletter
Cover<!--and everywhere-->age for PRVB<br><br>
This we<!--that mary-->ek, PRVB will be prof<!--went the-->iled by some major new<!--lamb was-->sletters<br>
along with the release of sign<!--sure to-->ificant news regarding incr<!--go-->eased<br>
reve<!--it followed-->nues for the Comp<!--her to-->any. There will be huge vo<!--school one-->lume, and a <br>
strong increase in price for several days. These are the same<br>
newsle<!--day which-->tters that profi<!--was against-->led NVEI two weeks ago. They brought<br>
NVEI from $.68 to $1.79 in ten days. We know for certain that<br>
the same groups are going to profi<!--the rules-->le PRVB this week.<br><br>
We are ve<!--humpty-->ry proud that we can sha<!--dumpty-->re this information with yo<!--sat-->u so<br>
that you may part<!--on a wall-->icipate alongside the many other Newslet<!--humpty-->ter<br>
subs<!--dumpty-->cri
to take a pos<!--the kings-->ition in PRVB as soon as po<!--horses-->ssible, today before the<br>
ma<!--and all-->rket closes, or to<!--the kings-->morrow.<br><br>
PRVB is a pros<!--men could-->perous and underva<!--not put-->lued oil and gas exploration <br>
company with reserves of 43 Billion cubic feet of natural gas<br>
operating in the Powder River Basin, one of the most prolific<br>
natural resource areas in the United States. The Company<br>
presently has a 100% working inte<!--humpty-->rest on 15,000 acres contiguous<br>
to Williams Coal Seam Gas (NY<!--together-->SE: WTU, $11) and Western Gas<br>
(N<!--again-->YSE: WGR, $38), the major players in this region. Recent <br>
news that the Company's wells have been producing millions of<br>
cubic feet of gas per day combined with several acquisi<!--jack be-->tions is<br>
having an extremely positive impa<!--nimble-->ct on reven<!--jack be-->ues and <br>ear<!--quick-->nings.<br><br>
The s<!--jack jump-->tock is tr<!--over the-->ading near its 52-<!--candlestick-->week low, and should begin m<!--hey diddle-->oving<br>
up immedia<!--the cat-->tly. We think the sto<!--in the-->ck could easily reach $1.50 in less<br>
than a month.<br><br>
<b>Goo<!--fiddle-->d Luck, and watch PRV<!--the dog-->B fly!</b>
</html>
Reinventing "crowds"? (Score:2)
Re:Reinventing "crowds"? (Score:2)
Re:Reinventing "crowds"? (Score:2)
Re:Reinventing "crowds"? (Score:1)
simple - because they can.
Re:Reinventing "crowds"? (Score:1, Informative)
Crowds is not anti-censorware, and has no provisions to allow for blocked URLs, nor does it have any way of working with nodes which are in any way blocked. It also assumes that you can trust everyone in your crowd -- messages are decrypted to plaintext at every node. While this might be tolerable within the AT&T workplace, the trust model breaks down when spies might be admitted to the network, or when users and their machines might be captured by hostile parties.
That's why 'crowds' wouldn't cut it.
Peekabooty website NOT blocked by the GFOC (Score:2, Informative)
Not that I really need this - I don't do anything that I need to hide from the Chinese government, Sure they block my access to Geocities and BBC but I don't see that as a bad thing.
- HeXa
Re:Peekabooty website NOT blocked by the GFOC (Score:1)
"Sure they block my access to Geocities and BBC but I don't see that as a bad thing."
Yes, but wouldn't you like to make that choice for yourself? Surely, if there is nothing on Geocities or the BBC that you want to read, then there is no need for someone to block your access in the first place.
I much prefer making decisions for myself; it was one of the big reasons for growing up.
Re:Peekabooty website NOT blocked by the GFOC (Score:1)
Re:Peekabooty website NOT blocked by the GFOC (Score:1)
Why do you think they encourage children to watch Sesame Street? Brain-washing of course! Have you heard all of the talk about "sharing" and "helping a friend in need" when we all know they are talking about Communism!! I mean they teach kids to always follow instructions (from a future dictator perhaps??), and to never question the social hierarchy of those in charge.
And oh yeah, C is for Cookie.
Picture encryption (Score:2, Informative)
Steganography (Score:1)
The article is also a bit confusing - first they say it encrypts files, then they 'can be protected with a password.'
Steganography is great for hiding encrypted stuff, but it only offers 'security through obscurity' alone. Also, if the encryption uses something like a fixed, unencrypted header or a magic number or PGP style header, it ought to be pretty easy to detect even if it cannot be decrypted. And that, of course defeats the whole purpose of stego.
excuse (Score:1)
Re:excuse (Score:2, Funny)
I bet there is a secret code in anonymous Slashdot posts that set off notification to pick up the newest version of gap.jpg off of goatse.cx.
For example:
Dirty Gnu Hippie: The plan is ready, go get new instructions.
BSD is dying: Abort mission, pick up new instructions from hick.org.
Alan Thicke: Mission sucessful, drinks in safe house tonight
After all, who is going to run checksums on something silly like the goatse guy?
Not decoding a message, but still detecting it (Score:1)
I would imagine that changing pixel tones ever so slightly would create at imbalance in the tone distribution, making solid-color areas slightly uneven. This may be undetectable to the naked eye, but software may be able to see it. And, wouldn't compression normalize like colors anyway?
If this is true (I don't know) I guess a way around it would be to embed smaller messages in larger images, placing only a single character in a given "color zone". Maybe an image with a more robust color scheme could be seen as suspicious.
They won't need any software (Score:1)
Users in countries where the Internet is censored do not necessarily need to install any software. They merely need to make a simple change to their Internet settings so that their access to the World Wide Web is mediated by the Peekabooty network.
About Peekabooty [peek-a-booty.org]
As usual... everyone is missing the point. (Score:3, Interesting)
Another nice benefit of this tool will be the developement of secure, anonymous P2P networks. Look at all the shit in the news lately about how ISP's are cutting off KaZaa. And, how Ranger Online [rangerinc.com] is tracking down Gnutella users. The RIAA/MPAA Gestapo is out to get us and take us down. New tools like Peekabooty and FreeNet will help to insure that these organizations will never, EVER shut down the free-flow of information on the Net. Peekabooty is a dagger that is aimed right at the heart of corporate America! It says: "You think you can take over the Net? Ha! Fuck you and the horse you rode in on!". This just proves to them that we can always defeat them with technology regardless of how much money they have!
Re:As usual... everyone is missing the point. (Score:1)
Re:As usual... everyone is missing the point. (Score:1)
donations (Score:1)
will my name show up if i grep the source code
Camera/Shy mirrors (Score:1)
http://www.mirrors.wiretapped.net/security/steg
or
ftp://mailprivately.com
6/4 anonymous proxy software (by cDc) (Score:2)
Re:uh yeah (Score:2)
Re:uh yeah (Score:1, Funny)
Re:hmm (Score:1)
Re:hmm (Score:2, Insightful)
Cars make it pretty easy for terrorists to build a car bomb. Ryder trucks make it pretty easy for terrorists to fill one with ANFO. Should we stop making cars? Should we stop renting trucks? Buses make good targets for suicide bombers. Should our metropolitan areas stop offering bus service?
I don't mean to pick on you personally, but I'm getting damn tired of the argument that we shouldn't do this or that because it might make something easier for a terrorist. Just because there are assholes in the world doesn't mean there aren't people with legitimate uses for new technology.
Re:hmm (Score:2, Funny)
Re:hmm (Score:1)
Encryption exists and is necessary (think of using your credit card on the net).
Banning a technology doesn't avoid criminals to use it. I think they still have guns, terrorists make bombs,
Re:Terrorists have already used this (Score:1)
And all this is very paradoxical. "We want Freedom! We Want to be able to do what we want with our computers" "Oh wait! You cant release that! Terrorosts might use it!" As the author is quoted as saying in the article, you might have to ban table napkins. Bomb plans could be written on them. One day you have to decide what side of the fence youre all gonna come down on.
Re:Great... (Score:1)
Fool.
Re:Great... (Score:3, Insightful)
What's the difference between criminals and "legitimate" political dissidents? To the governments of the world, nothing.
I'm sure King George thought Washington and Jefferson were "crazies".
I'm sure the British government thought Ghandi was a criminal. They put him in jail several times.
The price of a truly free country is that "drug runners and crazies can send undetectible messages to eachother with great ease". This has to be so that future Ghandis and Mandellas can do so also.
Or we can just shut everybody up. Yeah, lets do that. Let's start with you.