Scroll down to read this post.

 

Please consider supporting my work here at Behind the Black. I keep the website clean from pop-ups and annoying demands. Instead, I depend entirely on my readers to support me. Though this means I am sacrificing some income, it also means that I remain entirely independent from outside pressure. By depending solely on donations and subscriptions from my readers, no one can threaten me with censorship. You don't like what I write, you can simply go elsewhere.

 

You can support me either by giving a one-time contribution or a regular subscription. There are five ways of doing so:

 

1. Zelle: This is the only internet method that charges no fees. All you have to do is use the Zelle link at your internet bank and give my name and email address (zimmerman at nasw dot org). What you donate is what I get.

 

2. Patreon: Go to my website there and pick one of five monthly subscription amounts, or by making a one-time donation.
 

3. A Paypal Donation:

4. A Paypal subscription:


5. Donate by check, payable to Robert Zimmerman and mailed to
 
Behind The Black
c/o Robert Zimmerman
P.O.Box 1262
Cortaro, AZ 85652

 

You can also support me by buying one of my books, as noted in the boxes interspersed throughout the webpage or shown in the menu above. And if you buy the books through the ebookit links, I get a larger cut and I get it sooner.


Hiding messages using fonts

A new computer technique has been developed that uses subtle changes to a document’s fonts to encode secret messages and data.

Using Columbia University’s FontCode system, however, users can hide messages within unrelated text via virtually-invisible changes to the displayed letters.

Developed by a team led by associate professor of computer science Changxi Zheng, FontCode works with commonly-used fonts such as Times Roman, Helvetica, and Calibri, plus it’s compatible with most word processing programs. Additionally, the hidden messages are retained even when the document is printed on paper or converted to a different file type.

The video at the link explains very nicely how this works. The technology has some excellent potentially positive applications, such as providing a method of finding out if an original document has been modified. It also carries with it a great potential for misuse because of its ability to hide information unobtrusively in a written document.

Genesis cover

On Christmas Eve 1968 three Americans became the first humans to visit another world. What they did to celebrate was unexpected and profound, and will be remembered throughout all human history. Genesis: the Story of Apollo 8, Robert Zimmerman's classic history of humanity's first journey to another world, tells that story, and it is now available as both an ebook and an audiobook, both with a foreword by Valerie Anders and a new introduction by Robert Zimmerman.

 
The ebook is available everywhere for $5.99 (before discount) at amazon, or direct from my ebook publisher, ebookit. If you buy it from ebookit you don't support the big tech companies and the author gets a bigger cut much sooner.


The audiobook is also available at all these vendors, and is also free with a 30-day trial membership to Audible.
 

"Not simply about one mission, [Genesis] is also the history of America's quest for the moon... Zimmerman has done a masterful job of tying disparate events together into a solid account of one of America's greatest human triumphs."--San Antonio Express-News

6 comments

  • Dick Eagleson

    This seems to be an interesting cross between steganography and the font definition work of Donald Knuth.

  • MarcusZ1967

    And this will make even easier for one time pads or obscure books to pass messages……

  • Laurie

    If something is hidden in plain sight, one need only look to distinguish it. The privacy aspect of such schemes is found in the obscurity of algorithm particulars, not in algebraic complexity. I think the potential for anti-tampering (or some signature/authentication scheme) has utility but, again, with caveats.

  • Laurie

    Following up briefly: as the article points out, message privacy relies upon use of a (symmetric) key, so the advantage lies in concealing the very fact that a message is being transmitted (at all).

  • Ted

    This is amazing technology. It also scares the hell out of me. Can you imagine the possibilities of encoding top secret documents and files and shipping them everywhere and anywhere and no one would know just by looking at them? Mary had a little lamb = destruct sequence code is 1A2B. Since you currently need a smart phone to see the real message or a computer to see it what about Google glasses or a type of 3D gaming viewer. The rest of the world goes on unknowing while a select few….

    A number of years ago there was a sci-fi show where messages were somehow encoded into billboards and large signs on buildings. Yet wearing a special set of glasses the true message was revealed.

    I admire the engineering, the development etc but the far reaching implications are frightening.

  • MarcusZ1967

    John Carpenter’s They Live (1988).

    https://youtu.be/iJC4R1uXDaE

Readers: the rules for commenting!

 

No registration is required. I welcome all opinions, even those that strongly criticize my commentary.

 

However, name-calling and obscenities will not be tolerated. First time offenders who are new to the site will be warned. Second time offenders or first time offenders who have been here awhile will be suspended for a week. After that, I will ban you. Period.

 

Note also that first time commenters as well as any comment with more than one link will be placed in moderation for my approval. Be patient, I will get to it.

Leave a Reply

Your email address will not be published. Required fields are marked *