Cryptography Reference
In-Depth Information
Chapter 20
Translucent Databases
20.1 Missed Connections
To the kind person who tookmy new iPod from the gymon 49th
and Broadway, enjoy the ear mites.
To the person who left their coat behind at a bar in the East
Village, you can recover it at the coin lockers at Grand Central
Station. It's in locker 421 and the pass code is the first three
letters in the name of the bar followed by the two digits of the
date you left it behind.
To the redhaired stunner in a blue Nike running jacket on the
F train on Monday morning around 9 am. You took my heart
yesterday, a major felony, btw, that should be worth 5 to 7 years
and a fine not exceeding $10,000. LOL. I spoke with my parole
officer, who toldme it was okay to date on the first weekend out
of the joint. Call me, please.
To the two snickering high school students who looked at my
outfit, caught my eye and then covered their mouths while
laughing at me on the Number 2 train last Thursday. You can
stop looking for your black leather gloves. You left thembehind
on the train and I was too busy being hurt to tell you when you
left.
20.2 Hiding In Databases
Much of the work in this topic is aimed at hiding information in
the cracks of other pieces of information, in essence turning it into
Search WWH ::




Custom Search