Hackers tackle censorship with new tool

A group of hacker activists known as Hacktivismo is unveiling a new tool designed to help human rights proponents and political dissidents view censored information over the Web without fear of reprisal.

The steganography tool, will let users hide encrypted text within any gif image placed on a Web page. But critics say the tool can also be used by criminals and terrorists to disguise communication or plans for illegal activity.

Simple Secrecy

The tool, called Camera/Shy, works with Windows and Internet Explorer and lets users share censored or sensitive information buried within an ordinary gif image.

Although other steganography tools exist, Camera/Shy is designed for non-technical users--such as political dissidents who might ordinarily not know how to use such a tool.

The 1.21MB program lets users encrypt text with a click of the mouse and bury the text in an image. The files can be password-protected for further security. After posting an embedded image on a Web site, an activist can notify intended recipients by e-mail with code words such as "Go to this URL to see pictures from my birthday party."

Viewers who open the page with the Camera/Shy browser tool can then decrypt the embedded text on the fly by double clicking on the image and supplying a password.

The program is aimed at users who reside behind country firewalls, such as those in China, which censor Internet access to specific sites or content. It temporarily turns off the browser history and deletes all data in cache once a user closes the program so no one can trace where they've been. Users can download the program to a diskette to run on their computer or run it directly from the Web, leaving no footprints on their system.

Hacktivismo is releasing Camera/Shy as open source software, allowing anyone to tweak it for different languages or adapt it to other operating systems such as Linux.

Hackers Turn Activist

Hacktivismo is an offshoot of the famed hacking group Cult of the Dead Cow, creators of a Trojan horse called Back Orifice that lets hackers commandeer a machine infected with the program from across the Internet.

The subgroup was founded by a hacker activist named Oxblood Ruffin and has 35 members around the world. The creator of the program is a member called The Pull, who works for eEye Digital Security Inc., a security firm in California.

Ruffin says Pull got the idea for the program in a flash in May and then wrote the code in a day. After polishing it for a couple of weeks, he sent it off to a group of high-end security experts for bug testing.

But some criticize Hacktivismo for releasing a program that could easily be used by pornographers or terrorists to hide data. In February 2001, the U.S. Federal Bureau of Investigation claimed that Osama bin Laden was using steganography to hide maps and post instructions on terrorist targets for Al Qaeda cells around the world.

Ruffin says the program shouldn't be judged by possible misuse.

"We're certainly aware that people could take our technology and do nasty things with it. But what is the upside for democracy or human rights activists finally having some technology they can use?"

"Every technology can be corrupted," he adds. "The same hammer that Jimmy Carter uses to build a home for the homeless can be used by someone else to drive through the back of someone's head."

He says that to ban technology that could be used in nefarious ways would mean that few technologies could ever be released. "We'd have to ban cell phones and pagers and even cocktail napkins, because people write bomb instructions even on those."

He also points out that steganography has already been around for a long time. "There are far more robust systems out there. Ours just happens to be fairly easy to use."

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Kim Zetter

PC World
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?