Presented by:

C6741f09f444e6d4f069fa0c7c6fdd69

Gary Smith

from Pacific Northwest National Laboratory

Gary started out his professional career as a chemist/materials engineer. His start down the path to the Dark Side of Computing began when he wrote a program to design an optimal extruder screw rather than face thousands of calculations with a slide rule (yes, a slide rule.) Since then, he's done a lot of different things in computing. Always a glutton for punishment, he wrote his own sendmail.cf from scratch. Around 1993, Gary started doing computer security when the semiconductor company he was working for was forced to get on the Internet to send/receive Integrated Circuit designs faster and a firewall/Internet gateway was needed. Since then, Gary's been involved in firewalls, intrusion detection system and application hardening, and anti-spam filters. Gary really does computer security to support his bicycling habit. He has more bikes than most other people have computers. And they're a lot more expensive.

Encryption gets all the headlines these days. What isn’t getting the headlines is encryption’s brother steganography. It’s been around as long as encryption and has played a vital role in secret communications since the time of the ancient Greek and Chinese empires.

This presentation will explore:

  • What is steganography?
  • Why you would want to use steganography over encryption.
  • The history of steganography
    • The Greeks
    • The Chinese
    • Steganography goes to war
  • Techniques used in modern steganography
  • Examples of steganography
  • Programs that use steganography
  • Detecting steganography

Date:
Duration:
45 min
Room:
Conference:
LinuxFest Northwest 2019
Language:
Track:
Security
Difficulty:
Medium