Jump to content

Recommended Posts

Posted

Lets drag this topic into something real-ish, and now-ish, and hell of a lot more fun.  What is our ability to participate in embedding data in seemingly innocuous noises?  The math here seems unnecessary unless you are trying to slip it by an individual expecting data:

https://gist.github.com/windytan/d3bca32a22998dab962e

here is the overview:

http://www.windytan.com/2015/10/pea-whistle-steganography.html?m=1&utm_content=buffer3e26f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

,-. .--. ________ .-. .-. ,---. ,-. .-. .-. .-.
|(| / /\ \ |\ /| |__ __||| | | || .-' | |/ / \ \_/ )/
(_) / /__\ \ |(\ / | )| | | `-' | | `-. | | / __ \ (_)
| | | __ | (_)\/ | (_) | | .-. | | .-' | | \ |__| ) (
| | | | |)| | \ / | | | | | |)| | `--. | |) \ | |
`-' |_| (_) | |\/| | `-' /( (_)/( __.' |((_)-' /(_|
'-' '-' (__) (__) (_) (__)

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...