
#Mega downloader for pc password
The security of the system is based on the password chosen for ciphering the data, so if the password is strong enough, it wouldn't be a mistake say that yes, it could be considered quite secure :) Taking this into account, we have used some of the most advanced techniques to protect and hide the links inside JPEG images. The key is derived with a PBKDF2 function, using more than 25,000 SHA1 iterations with a salt.įirst, consider there is nothing 100% secure (specially for the NSA :p). Second, the message is ciphered, using a 256 bit AES cipher, with a random IV generated with a CSPRNG ( Cryptographically Secure PseudoRandom Number Generator). It also distributes the message over the image, using a pseudo-random distribution based on a password, which difficults the analysis. This ensures that will be very difficult, or even impossible in some cases, to discover a message in the image (the smaller message, the more difficult to discover). Which techniques implement MegaDownloader?įirst, MegaDownloader uses the F5 algorithm to hide links inside the JPEGs. When we say "broken" we mean that an analyst can discover a secret message with a certain probability, but if it is ciphered, then he won't be able to deciphered it without the password - if the cipher algorithm is good, of course. So, to sum up, most of the steganographic algorithm are considered "broken", although F5 is one of the most secure. However, if the message is small enough compared to the container image, the probability of discovering a message is reduced. This algorithm can be broken in some cases using an statistical test called " Chi Square analysis". The bad side is that these methods are old and nowadays are considered broken - using statistical attacks it is possible to detect a message hidden.Ī more recent technique called "F5" (an evolution of F3 and F4 algorithms) allow to hide information in the JPEG but makes it much difficult to an analyst to discover the message - it offers a good resistance to statistical attacks. This is how both Outguess and JSteg works. For example, hidding information in the DCT matrix. There are more complex techniques for JPEG. These methods are trivial, a normal user won't see them easily but a stegano analyst will discover it immediately. The simpler way is to hide information after the EOF of the JPEG, or inside the EXIF or the comment markers (COM). so what about JPEGs (the most common image format)? A stegano analyst will use "statistical attacks" in order to determine if there is a message hidden - normally with some degree of success. A normal user won't be able to retrieve the data or notice there is something hidden. The first step is more complex and depends on the image type.įor Bitmaps, normally the information is hidden in the LSB (less significant byte). This second step is easly achieved using cryptography (AES for example).



Steganography consists in two steps (normally it is referred as the first one, but in practice both are always applied): Moreover, links will be protected with a password (optional), so discover the hidden data will be very difficult (or directly impossible).

#Mega downloader for pc download
MegaDownloader will also allow to choose between saving the links in a visible way, or an "invisible" way, so the user that retrieves them will be able to download them, but not see them.
