Found attachment of size 1034123.

Sat, 28 Feb 2026 10:43:13 -0800 Andy from private IP, post #18269691 /all My greatest ever work: MOSAIC Announcing the discovery of a technique/system we're calling MOSAIC: An automated covert electronic distribution and payment system using a digest of reconstituted message fragments. All that is required is an email or XMPP server and you have an essentially undetectable platform for distributing CSAM and taking payments, both of which would be stored in a server-side queue, sent in pieces in custom email headers, and recorded in a blockchain ledger. This is a big deal because someone who doesn't have the app on the receiving end only sees a custom email header encoded in Base64, also encrypted. This is kind of like FreeNet, but easier to automate and harder to detect. Detection would depend on catching custom email headers in the raw source of the Epstein emails. The government has that and could easily do this with the #EpsteinFiles if they have the raw source. Ever wonder whether Hillary had custom headers set on her email server? That would be a good place to look, as well. #News #Programming #Technology Sun, 01 Mar 2026 07:36:04 -0800 Andy from private IP Reply #10854004 I updated the graphic to clean up a few things and add more. https://www.watters.law/articles/attachments/11-MOSAIC.pdf Sun, 01 Mar 2026 08:40:04 -0800 phosita from private IP Reply #17976678 👍 Why confine yourself to email headers? This just looks like a different flavor of stego to me. You could embed the Base64 stuff in one or more formats capable of holding it: (1) email, be it headers as you propose or body text itself; (2) binary images (various stego libs exist); (3) audio, using subaudible stuff you can exctract using DSP; and (4) so on. I strongly suspect that, but have not personally tested whether, #2 and #3 can be done in a way that survives transcoding. Seems to me the utility of what you have proposed is for establishing a covert channel of communication. An attacker has to: determine that cyphertext is being exchanged; determine what cyphertexts from the universe of known cyphertexts are the entirety of a message; assemble the cyphertexts correctly; and decrypt the cyphertext into plaintext. The limit of this is the ability of a sophisticated attacker - now or in the future - to reassemble and decrypt. This includes rubber hose cryptography. Not that there isn't utility in hiding the fact that you're sending cyphertext to someone. There is nonzero. Still security by obscurity though. Alice and Bob, using MOSAIC, must also arrive at a satisfactory solution to the problem of key exchange. I realize that's not the use case for MOSAIC. (Alice and Bob could use MOSAIC for key exchange, but then it's MOSAICs all the way down until at bedrock there's some non-MOSAIC key exchange.) Oh also MOSAIC as you've described it distributes *encrypted* partial cyphertext; but I suppose there's no inherent reason the stuff couldn't be plaintext either. See also ye olde BBS tech of using .par files. Also comes to mind various schemes for distributing a $foo among n people such that Sun, 01 Mar 2026 08:43:03 -0800 phosita from private IP Reply #17195120 ...huh...that got truncated. Buggy. Anyway such that "[less than symbol] n of them can reconstitute it." Think "we 9 are the group who sign the root certs; and any 7 of us can reconstitute the key." Sun, 01 Mar 2026 12:55:30 -0800 Andy from private IP Reply #16367873 Yes, it's not limited to email, but this is an ideal delivery platform since nobody is looking on port 25 for extra headers when most email servers have TLS connections anyway and the government isn't going to crack the encryption. Sure, in the old days of insecure email and Telnet, this wouldn't work, which is why it's timely now. I'm not talking about steganography in images, which is already well-known. This is a fragmentation approach that hides well in existing email traffic, which may be novel. I appreciate your insight, in any case.Replies require login.
@17976678 Andy 👍
