Practical attack on Steghide

It is used by Tomb by the way!

Tomb also supports deniable key storage using steganography. One can tomb bury and tomb exhume keys to and from JPEG images when the utility steghide is installed.


The author seems to have also detected a lot of steganography techniques, it actually reminds me of plausible deniability and how it can be easily detected.

1 Like

Good stuff.

Thanks for sharing