summaryrefslogtreecommitdiff
path: root/security/hydan/PLIST
diff options
context:
space:
mode:
authoragc <agc>2004-08-13 10:26:03 +0000
committeragc <agc>2004-08-13 10:26:03 +0000
commit5a60c04b89f6f68bcfffab0c5c06eed8b1399e82 (patch)
tree6306c4f703d800a1317bdc8ae6df4bbb7cc0f825 /security/hydan/PLIST
parent7e6424b2d8a3b840655986bbea1fb78153507ac5 (diff)
downloadpkgsrc-5a60c04b89f6f68bcfffab0c5c06eed8b1399e82.tar.gz
Initial import of hydan-0.13 into the Packages Collection.
Hydan steganographically conceals a message into an application. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. Features: - Application filesize remains unchanged - Message is blowfish encrypted with a user-supplied passphrase before being embedded - Encoding rate: 1/110 Primary uses for Hydan: - Covert Communication: embedding data into binaries creates a covert channel that can be used to exchange secret messages. - Signing: a program's cryptographic signature can be embedded into itself. The recipient of the binary can then verify that it has not been tampered with (virus or trojan), and is really from who it claims to be from. This check can be built into the OS for user transparency. - Watermarking: a watermark can be embedded to uniquely identify binaries for copyright purposes, or as part of a DRM scheme. Note: this usage is not recommended as Hydan implements fragile watermarks.
Diffstat (limited to 'security/hydan/PLIST')
-rw-r--r--security/hydan/PLIST7
1 files changed, 7 insertions, 0 deletions
diff --git a/security/hydan/PLIST b/security/hydan/PLIST
new file mode 100644
index 00000000000..75106941b39
--- /dev/null
+++ b/security/hydan/PLIST
@@ -0,0 +1,7 @@
+@comment $NetBSD: PLIST,v 1.1.1.1 2004/08/13 10:26:03 agc Exp $
+bin/hydan
+bin/hydan-decode
+bin/hydan-stats
+share/hydan/README.details
+share/hydan/README
+@dirrm share/hydan