pull down to refresh
31 sats \ 12 replies \ @DarthCoin 11 Mar \ parent \ on: Stacker Saloon
The most canonical version of this image that I know of is the one from your GitHub repository in https://github.com/Darth-Coin/darth-coin.github.io/blob/main/assets/images/
But it's a .jpg
$ mediainfo cats-stego.jpg
General
Complete name : cats-stego.jpg
Format : JPEG
File size : 38.4 KiB
Image
Format : JPEG
Width : 640 pixels
Height : 480 pixels
Color space : YUV
Chroma subsampling : 4:2:0
Bit depth : 8 bits
Compression mode : Lossy
Stream size : 38.4 KiB (100%)
Does that even still contain the steganographic data?
Is there a method to convert a TIFF (written by OpenStego) to a JPG so it retains the information?
Or would I have to put the TIFF itself on the web?
You allude to this in your guide
I can send this photo to anyone (it is necessary without digital alterations/ compression) anywhere in the world, without anyone knowing that this photo contains 1BTC. Or I can even have it as a desktop background or in a digital photo frame-box.
Is the cat image in your guide still containing the secret data, or is this just an illustration of the concept? If it still contains the secret data, how does one create such a JPG file?
reply
check also these tools you can play with:
reply
Thanks I’ll add them to the list of bot busters!
reply
What you inspect is a copy. When you copy the file with stego info is losing the embedded data from stego.
Only the original file contain it.
By saying that "I can send this image to somebody else" I mean I will use the ORIGINAL file that I used in stego, not a copy.
So people looking to "decrypt" this file posted online, will find nothing in fact.
reply
Ah, I understand.
When I want to put such an image of my own somewhere public, it's a little suspicious if I post a large .tif file. People might immediately suspect it contains stego.
I was wondering if you had found an elegant way of losslessly compressing it to .jpg.
Best I could think of is ImageMagick's convert image.tif image.jp2 (where JPEG 2000 can contain losslessly compressed data), then rename to image.jpg.
reply
keep in mind: whatever alteration to the original stego-ed file it will lose all the stego information. Be careful with that, otherwise you could lose the data you put inside. And always test your steganography.
This method is not to be used with only one copy.
reply
I've seen that before, but you being DarthCoin, I always assumed this to be cryptographically secure steganography with a strong password.
Is this a hunt, where an amateur can realistically figure out the seed words from the picture?
Or a I dare you break this AES-256 encryption without any key information, knowing full well nobody can, hence not risking any Bitcoin at all?
reply
then good luck finding the 12 words in my guide.
reply
I studied https://darth-coin.github.io/beginner/be-your-own-bank-en.html where that image is present.
The "Madness in plain sight" paragraph mentions the 12 words. But if I were to follow your guide and hide my own 12 words in a document of my own, to reconstruct them later, how would I later
- identify which words were special to me
- in what order they go in the passphrase (if not from first to last)
I notice there are about 12 worlds like “cleanliness” in quotation marks. But putting those, in order, in OpenStego doesn't work. As you note
Even if you think about it, they have many years of trying until they can find the order …
But how would I, in the future, deduce the right order?
BTW, your explanation of PublicNote
This algorithm (which is open source and you can take it offline if you want) makes an encryption of this text resulting in another text
can be dangerously misunderstood: Yes, the software is open source and you can run your own instance. But the data is stored on the server, and when the server goes offline (your own server can vanish, too!), you can't follow these breadcrumbs anymore. If you stored your texts on the public server, and that goes away, you can't install your own server from the open source to get the texts back.
reply
I will put it easier for you: in one of my guides there are 12 words in plain sight. But are randomly (for the reader) arranged inside the text that will be almost impossible to find them and also know the right order.
I am the only one knowing the position.
I gave you that example not to start now to search them into my guide, but to do it for yourself. It will be insane to start searching them.
reply
And these 12 words are the seed words for the wallet? Or the passphrase for the OpenStego cat image?
Or does the cat image have a completely different password (not 12 words at all)?
I guess I don't understand what the point is of putting 12 seed words in a cat image and encrypt it with 12 other words, which are then put into a public text, requiring me to remember 12 positions. It all boils down to me remembering 12 things :)
reply
No, you didn't understand.
The cats image is just a separate method or as a backup.
The image is encrypted wuth stego and inside are the 12 words for a seed. No passphrase.
The 12 words insidebthe guide is just another method. Again are just spread among the guide text positioned in specific places so I can recover them if I need it.
Consider these methods the backup of a backup. I will not rely for example only on one place. I use different methods just in case of shtf and I cannot access o r if the methods.
For example the backup of these 2 methods is another one:


See the 12 high peaks in this picture? Each peak contain a resistent recipient with a word inside.
So in order to retrive the 12 words seed you must hike all 12 peaks (and is not do easy). Also you need to know the order. So even if somebody will find a recipient, it will be useless.