Obfuscation
The process of making something unclear. It’s now much more difficult to understand.
But its not impossible to understand if you know how to read it.
Hide information in plain sight. Store payment information without storing a credit card number.
Steganography
Hide information inside of an image.
Greek for “concealed writing”. Security through obscurity.
Message is invisible but it’s really there.
The covertext. The Container document or file.
Common Steganography techniques
Network based. Embed messages in TCP packets.
Use an image. Embed the message in the image itself.
Invisible watermarks. Yellow dots on printers.
Audio steganography
Modify the digital audio file. Interlace a secret message within the audio. Similar technique to image steganography.
Video Steganography
A sequence of images. Use image steganography on a larger scale, Manage the signal to noise ratio, potentially transfer much more information.
Tokenization (see demonstration on video)
Replace sensitive data with a non-sensitive placeholder. EX SSN 266-12-1112 is now 691-61-8539.
Common with credit card processing. Use a temporary token during payment. An attacker capturing the card numbers can’t use them later.
This is not encryption or hashing. The original data and token are not mathematically related.
Data obfuscation
Hide some of the original data.
Protect PII and other sensitive data.
May only be hidden from view. The data may still be intact in storage. Control the view based on permissions.
Many different techniques. Substituting, Shuffling, encrypting, masking out, etc.