Deutsch   English   Français   Italiano  
<vlfjtn$1ande$7@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: Rich <rich@example.invalid>
Newsgroups: sci.crypt
Subject: Re: xorpng
Date: Mon, 6 Jan 2025 03:50:15 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 62
Message-ID: <vlfjtn$1ande$7@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team>   <vlc8om$k8s5$3@dont-email.me> <vlc9d8$irra$1@paganini.bofh.team> <vlcahc$ks00$1@dont-email.me> <vlcbki$j00g$1@paganini.bofh.team> <vlccrh$lb6a$1@dont-email.me> <vlchr0$j921$1@paganini.bofh.team> <vlcivh$md8n$2@dont-email.me> <vlcjan$oal1$2@paganini.bofh.team> <vld86b$tdna$1@dont-email.me> <vldj6q$pqvr$2@paganini.bofh.team> <vlevq2$17khf$4@dont-email.me> <vlf07h$17khf$5@dont-email.me> <vlf0f4$s1t0$1@paganini.bofh.team> <vlf1fi$17khf$9@dont-email.me>
Injection-Date: Mon, 06 Jan 2025 04:50:15 +0100 (CET)
Injection-Info: dont-email.me; posting-host="aacc148df4532970fbc7162b818dee32";
	logging-data="1400238"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18rcm6GtKvCuEEF7u9dD6fw"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:bs86ffivcCG8ivk4Ga3tGV6gI5I=
Bytes: 3917

Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
> On 1/5/2025 2:18 PM, Stefan Claas wrote:
>> Chris M. Thomasson wrote:
>>> On 1/5/2025 2:06 PM, Chris M. Thomasson wrote:
>>>> On 1/5/2025 1:25 AM, Stefan Claas wrote:
>>>>> Rich wrote:
>>>>>> Stefan Claas <pollux@tilde.club> wrote:
>>>>>>> Rich wrote:
>>>>>>>
>>>>>>>> If instead you mean some kind of "special, PNG aware, encryptor that
>>>>>>>> only encrypted the bitmap data of a PNG", but left the file as
>>>>>>>> otherwise a proper PNG image structure, then that is slightly tricky
>>>>>>>> (and an algorithm that is only useful for PNG's alone).
>>>>>>>
>>>>>>> Yes, this is what I mean.
>>>>>>
>>>>>> Which brings up the question of: why?
>>>>>>
>>>>>> Why go to the trouble to create an encryptor that is specalized for
>>>>>> just encrypting the internal bitmap data within a PNG, leaving the rest
>>>>>> as a PNG file, when a generic "byte stream" encryptor will encrypt the
>>>>>> entire PNG with no extra effort?
>>>>>
>>>>> To make more content as allowed postable on social media, like X.
>>>>>
>>>>
>>>> Well, posting a png to say, facebook, well... It's probablly going to
>>>> turn it into a jpg... This can ruin the embedded ciphertext in the png
>>>> image...
>>>
>>> Actually, the damn FB allows me to send my links with embedded
>>> ciphertext just fine.
>> 
>> It is for X and not Meta.
>> 
> 
> Well, sending say a PNG to X, it still might convert it into a JPG. It 
> might alter things for compression purposes. This can mess around with 
> your payload...

There are several "modifications" to a PNG that can be performed, that 
for a photo or a "meme image" will not result in visible changes, but 
*will* result in changes to the bitmap.

Several possibilities are:

1) convert RGBA to just RGB (remove alpha channel) -- if one created a 
"crypto carrier" PNG that used an alpha channel, this conversion would 
delete 25% of the data content.

2) convert RGB (24 bits per pixel) to indexed (either eight or sixteen 
bits per pixel).  Both require color mapping from 2^24 colors to either 
2^8 or 2^16 total colors, resulting in an altered bitmap.

3) convert RGB or indexed images into a "low color" index image (i.e., 
max 64 colors) which requires the same color mapping as #2 above, and 
will create a different bitmap.

Simply uploading a PNG to X, then downloading the PNG X serves, and 
identifying it as a "PNG" does not tell the full story.  You have to 
look at what "kind" of PNG was uploaded, and what "kind" of PNG 
returned, to know what transformations X performed.