> I've got a program that will hide any data I want within a sufficiently
> complex image in GIFF format, and another program that will embed data
> within a gzip file. The result, in either case, is something I can make
> absolutely sure is undetectible by you as an "unsecure" object.
Actually, with enough nifty equipment doing enough tagging of
information as it bounces around the insides of machines and networks, this
can be stopped or slowed down. You could also hotwire your mail gateway to
check the information content of outgoing mail, and if it's too high bounce
it or shuffle it aside for hand processing. Say, run all outgoing mail
through 'compress' and if the result is bigger than some threshold,
>I'd say that this negates your point pretty well. Can we stop talking
>about e-mail now? Please?
I'd sure like to see the 'x.400 SUX d00d' comments go away, but
I find the descriptions of actual products interesting.