Information Security
1. Introduction
○ Security by obscurity
§ Steganography
□ Hiding data inside another form of data, like using non-used bits in image to hide a message
§ Cool, but not practical.
§ Disadvantages…
Thanks for the episode : )
i liked Yaser 's example as simulating the process of securi…
thank yiy, guys! great podcost!