new tutorial: why the blog

This commit is contained in:
nihilist 2025-04-30 11:23:16 +02:00
parent 68196c4d47
commit a5eeb2ca14
33 changed files with 1025 additions and 37 deletions

View file

@ -76,7 +76,7 @@
<div class="col-lg-8 col-lg-offset-2">
<p>The important difference between the two fields is adherence to <i><a href="https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle">Kerckhoffs's principle</a></i>: the assumption that an algorithm must be publicly known to guarantee that it has no flaws or backdoors. (This is the reason why you should only use open source crypto software and never roll your own crypto.)<br/>Steganography does the opposite by relying on <i>security by obscurity</i>: the method by which you hid your data must be kept secret.</p>
<p>That means that whilst complementary to cryptography, steganography on itself is less secure than the mathematically provable security provided by cryptography. Think of it as tucking away your valuables in secret location versus putting them into a sturdy safe. The safe may draw immediate attention by burglars, but provides reliable resistance to attacks, whilst it is up to chance whether they find your hidden stash.</p>
<p>That means that whilst complementary to cryptography, steganography on itself is less secure than the mathematically provable security provided by cryptography. Think of it as tucking away your valuables in secret location versus putting them into a sturdy safe. The safe may draw immediate attention by burglars, but provides reliable resistance to attacks, whilst it is up to chance wheter they find your hidden stash.</p>
<h3>Then why use steganography at all?</h3>
<p>In military science, there is the concept of the <i>Integrated Survivability Onion</i> &mdash; in short, the idea that they can't kill you if they don't hit you, that they can't hit you if they don't shoot at you and that they can't shoot at you if they don't see you. The same thing applies to every good digital defense-in-depth approach. Using steganography can't harm you, but <b>it shouldn't be all your rely on</b>. In our example, a hidden safe is better than either option on its own.</p>