/top /all /jobs
Topics: #Alcohol #DrugFree #Education #Hobbies #LawFirm #Movies #Music #News #Politics #Programming #PublicFigures #Romance #Technology

(PCRE-compatible)
Email administrator

Read Post
Found attachment of size 1034123.

Sat, 28 Feb 2026 10:43:13 -0800
Andy from private IP, post #18269691

/all
My greatest ever work: MOSAIC

Announcing the discovery of a technique/system we're calling MOSAIC: An automated covert electronic distribution and payment system using a digest of
reconstituted message fragments. All that is required is an email or XMPP server and you have an essentially undetectable platform for distributing CSAM and
taking payments, both of which would be stored in a server-side queue, sent in pieces in custom email headers, and recorded in a blockchain ledger. This is a
big deal because someone who doesn't have the app on the receiving end only sees a custom email header encoded in Base64, also encrypted. This is kind of like
FreeNet, but easier to automate and harder to detect.  Detection would depend on catching custom email headers in the raw source of the Epstein emails. The
government has that and could easily do this with the #EpsteinFiles if they have the raw source.
Ever wonder whether Hillary had custom headers set on her email server?  That would be a good place to look, as well.

#News #Programming #Technology 


Sun, 01 Mar 2026 07:36:04 -0800
Andy from private IP
Reply #10854004

I updated the graphic to clean up a few things and add more.
https://www.watters.law/articles/attachments/11-MOSAIC.pdf


Sun, 01 Mar 2026 08:40:04 -0800
phosita from private IP
Reply #17976678
 👍 
Why confine yourself to email headers? This just looks like a different flavor of stego to me. You could embed the Base64 stuff in one or more formats capable
of holding it:
(1) email, be it headers as you propose or body text itself;
(2) binary images (various stego libs exist);
(3) audio, using subaudible stuff you can exctract using DSP; and
(4) so on.

I strongly suspect that, but have not personally tested whether, #2 and #3 can be done in a way that survives transcoding.

Seems to me the utility of what you have proposed is for establishing a covert channel of communication. An attacker has to: determine that cyphertext is being
exchanged; determine what cyphertexts from the universe of known cyphertexts are the entirety of a message; assemble the cyphertexts correctly; and decrypt the
cyphertext into plaintext. The limit of this is the ability of a sophisticated attacker - now or in the future - to reassemble and decrypt. This includes rubber
hose cryptography.

Not that there isn't utility in hiding the fact that you're sending cyphertext to someone. There is nonzero. Still security by obscurity though.

Alice and Bob, using MOSAIC, must also arrive at a satisfactory solution to the problem of key exchange. I realize that's not the use case for MOSAIC. (Alice
and Bob could use MOSAIC for key exchange, but then it's MOSAICs all the way down until at bedrock there's some non-MOSAIC key exchange.)

Oh also MOSAIC as you've described it distributes *encrypted* partial cyphertext; but I suppose there's no inherent reason the stuff couldn't be plaintext
either.

See also ye olde BBS tech of using .par files. Also comes to mind various schemes for distributing a $foo among n people such that 


Sun, 01 Mar 2026 08:43:03 -0800
phosita from private IP
Reply #17195120

...huh...that got truncated. Buggy.

Anyway such that "[less than symbol] n of them can reconstitute it."

Think "we 9 are the group who sign the root certs; and any 7 of us can reconstitute the key."


Sun, 01 Mar 2026 12:55:30 -0800
Andy from private IP
Reply #16367873

Yes, it's not limited to email, but this is an ideal delivery platform since nobody is looking on port 25 for extra headers when most email servers have TLS
connections anyway and the government isn't going to crack the encryption.  Sure, in the old days of insecure email and Telnet, this wouldn't work, which is why
it's timely now.  I'm not talking about steganography in images, which is already well-known.  This is a fragmentation approach that hides well in existing
email traffic, which may be novel.  I appreciate your insight, in any case.


@17976678 Andy 👍
Replies require login.

Telemetry: page generated in 29.9 milliseconds for user at 216.73.216.15 on 2026-03-02 00:59:41

© 2026 Andrew G. Watters, Esq.

Test