Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cybersecurity Incident & Vulnerability Response Playbooks

Operational Procedures for Planning and Conducting Cybersecurity Incident and Vulnerability Response Activities in FCEB Information Systems

Publication: November 2021

Cybersecurity and Infrastructure Security Agency

DISCLAIMER: This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyrght rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see

---

Converting the first page of the sample PDF file to a tiff file using ghost script and running tesseract OCR without any special filters.

>Resistant to Optical Character Recognition (OCR), most laypeople will need to print+rescan to OCR

This is not OCR resistant, I used the same two liner I used to get my textbooks scanned at university 20 years ago.



You specifically are technologically proficient. Not everybody knows how to export to a tiff and then OCR. 98% don't. When I say "OCR Resistant", I mean that I haven't found PDF software with built in OCR that has managed to extract the english text back out.


That's like saying a lock is pick resistant because you haven't been able to open it with a dead fish.

Words mean things, if what you did can't stand up to 20 year old technology then it's basically useless. Remove the claim that it resists OCR and just called it copy/paste proof and unsearchable.


if a lock convinces most popular lock-picking devices to use the ineffective dead fish technique then it's something atleast


Using tesseract ocr is literally the first thing anyone does.


PDF software doesn't attempt to OCR text because it is already text. This fools PDF software not to even attempt to OCR rather than defeating OCR.

What you're resisting here is the ability for other applications scrape the already text-format text.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: