Hacker News new | past | comments | ask | show | jobs | submit login

What a terrible post. Every single example is simply security through obscurity. Once a leaker understands the ways in which a file may be watermarked, they will likely be able to circumvent it. An example of a watermarking method that does not fall apart when people know what to look for would make a very good article. This is not that article.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: