Message from @Undead Mockingbird

Discord ID: 496782575390556170


2018-10-02 20:30:37 UTC  

I was mentioning side channels, because in computer security, there have been amazing bugs that kind of inferred data through very unlikely means, such as the pattern of memory access by another process.

2018-10-02 20:30:37 UTC  

is like there a red tape on hardware

2018-10-02 20:30:47 UTC  

and only big ones are allowed to have hardware

2018-10-02 20:30:48 UTC  

Side channel attack would be taking a camera phone and record it while it is playing

2018-10-02 20:30:53 UTC  

So in confused

2018-10-02 20:31:02 UTC  

lol

2018-10-02 20:31:12 UTC  

Huh? No, I just explained what a side channel attack is in the context of computer security.

2018-10-02 20:31:42 UTC  

I do not know what term you are talking about, but if you are correct, there might be different uses of the term in different contexts.

2018-10-02 20:32:16 UTC  

This is what I am talking about: https://www.wikiwand.com/en/Side-channel_attack

2018-10-02 20:33:26 UTC  

Just like binary is just an arbitrary encoding, you can also encode arbitrary data in movies.

2018-10-02 20:34:03 UTC  

Just like any of the letters of this sentence can be represented in numbers, such as their unicode encoding.

2018-10-02 20:34:14 UTC  

But the issue is you want to decrypt it in a mitm attack?

2018-10-02 20:34:26 UTC  

Why not just record it on the player level

2018-10-02 20:34:31 UTC  

I don't know if that was the intention.

2018-10-02 20:34:59 UTC  

I was using the example of the side channel attacks as an example of how regular communication and processes can be piggy backed on to communicate other information.

2018-10-02 20:35:08 UTC  

Not really

2018-10-02 20:35:23 UTC  

https://cdn.discordapp.com/attachments/463054787336732683/496782270510661632/Screenshot_20181002-133512_Firefox.jpg

2018-10-02 20:35:46 UTC  

Side channel is using hardware to decrypt it since 1 uses power vs 0

2018-10-02 20:35:52 UTC  

"In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs). Timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited."

2018-10-02 20:36:18 UTC  

Well youtube has a major vulnerability on encrypted video. It is decrypted with the player

2018-10-02 20:36:35 UTC  

I don't want to get off topic.

2018-10-02 20:36:40 UTC  

So you can record the overlay of the video

2018-10-02 20:37:09 UTC  

So im confused, why would you use YouTube for eyes only video...

2018-10-02 20:37:23 UTC  

Like for limited access

2018-10-02 20:37:33 UTC  

I was responding to a hypothetical question.

2018-10-02 20:38:02 UTC  

The question, as I understood it, was whether one can "hide" data in an otherwise valid video.

2018-10-02 20:38:06 UTC  

You talking about youtive contentid algorithm?

2018-10-02 20:38:12 UTC  

No.

2018-10-02 20:38:40 UTC  

It is a obfuscation technique you can do against YouTube ai...

2018-10-02 20:39:30 UTC  

But you cant hide data in the audio channels since YouTube will check it and see does it conform to a known audio format

2018-10-02 20:39:51 UTC  

But there has been an idea on using audio format to hold data outside of sound

2018-10-02 20:40:04 UTC  

Yes, but you can still encode whatever you please in the data you upload.

2018-10-02 20:40:24 UTC  

Lol

2018-10-02 20:40:39 UTC  

Tim's new vid

2018-10-02 20:40:39 UTC  

But, that's really, REALLY hypothetical.

2018-10-02 20:40:49 UTC  

imaginemyshock.jpg

2018-10-02 20:40:52 UTC  

I was just playing along, because I liked the thought experiment.

2018-10-02 20:41:03 UTC  

Which video? @♓♏♋

2018-10-02 20:41:25 UTC  

Left eating their own?

2018-10-02 20:42:11 UTC  

Anyway, we're so far off topic now, we took the safari to Russia.

2018-10-02 20:43:17 UTC  

Yes