filmov
tv
What is Steganography? - Daniel's Security Academy

Показать описание
After finishing the cryptography block for a moment, we take a closer look into the topic of steganography. It follows the same goal as cryptography but executes it entirely different. See this session to find how steganography hides secret messages or entire book chapters into a single picture for example. Feel free to ask or comment in the comment section below and give me feedback of what I can improve on or what I should cover in the next sessions.
Feel free to connect with me:
Instagram: @danielschmalen
#security #itsecurity #it #cybersecurity #cyber #university #academy #learning #networks #timetolearn #onlinelearning #onlinetutor #interactivelearning #elearning #asymmetric #encryption #rsa #dh #diffiehellman #dsa #digitalsignaturealgorithm #example #explained
University icons created by Freepik - Flaticon
Feel free to connect with me:
Instagram: @danielschmalen
#security #itsecurity #it #cybersecurity #cyber #university #academy #learning #networks #timetolearn #onlinelearning #onlinetutor #interactivelearning #elearning #asymmetric #encryption #rsa #dh #diffiehellman #dsa #digitalsignaturealgorithm #example #explained
University icons created by Freepik - Flaticon
Erlang Factory SF 2015 - Derek Brown - Steganography and Data Hiding
Securing the JVM • Nicolas Frankel • GOTO 2019
DEMO: Instegogram: Exploiting Instagram for C2 via Image Steganography
Daniel Crowley - Key Search Attacks Against Modern Symmetric Ciphers - DEF CON 27 Conference
Daniel Martinez - Whatsapp y El abusón de las features. Hoy Cinecito [RootedCON 2016 - ENG]
DEF CON 25 - Philip Tully, Michael T Raggo - A Picture is Worth a Thousand Words, Literally
ACM CCS 2017 - Algorithm Substitution Attacks from Steganographic Perspective - Maciej Liskiewicz
DeepSec 2011: The Security of non-executable Files
🔴 October 3's Top Cyber News NOW! - Ep 210
LANL: Homomorphic Encryption for Quantum Annealing with Spin Reversal Transformations
How To Encode Text In PNGs (HACK?)(Loud sound alert at the end, sorry)
Daniel Jones - Sound and signalling: A whistle stop tour (ADC'17)
Track 202 The Poetry of Secrets An Introduction to Cryptography Eric Kolb
Securing the JVM - Neither for fun nor for profit, but do you have a choice?
'Stegosaurus,' Dinosaurs Songs by StoryBots | Netflix Jr
Exhibition 'Public secrets'
Hacking With Python #13 - Finding Meta Data in Images
The Singularity & Friendly AI? - Computerphile
Tweets, Beats, and Sheets: C2 over Social Media
Let's Automate: LINUX PRIVILEGE ESCALATION - Pt.4
CO212 Principles of Security - Step by step resolution of GrrCON 2012 Crypto Challenge 1
The Dangers of Metadata! | Go Incognito 1.5
400 Data Obfuscation How to hide data and payloads to make them not exist in a mathematically optima
LifeEdited: Building a Less but Better Digital Lifestyle | Graham Hill | TEDxGateway
Комментарии