You are viewing a single comment's thread.

view the rest of the comments →

[–] knuck887 0 points 12 points (+12|-0) ago 

Go grab openstego

Toss files all over the internet as photos

Here's the liberator

Use AES128 to Extract, no password

[–] ExpertShitposter [S] 0 points 4 points (+4|-0) ago 

All defense distributed files are available as torrent on piratebay3

[–] knuck887 0 points 3 points (+3|-0) ago 

True- but I like the extra TAKE-THAT feeling of showing somebody an image and telling them what it is.

[–] Womb_Raider 1 points 0 points (+1|-1) ago 


[–] ToFat2Fish 0 points 4 points (+4|-0) ago 

Didn't any one ever teach you the cencorship always works.

[–] Alopix 0 points 0 points (+0|-0) ago 

What's all that? Make a .7z archive(or any other file) and put it at the end of any other file. Password protect the archive if you want encryption.

On Windows:

copy /b coverfile + filetohide nameofmergedfile

On Linux:

cat coverfile filetohide > nameofmergedfile

Archives are typically used as filetohide for usefulness and ease(archivers ignore extra data at the start,) and images as coverfile because photo viewers ignore extra at the end. The combo is convincing and easy to separate. That said, the files can be anything.

This method as well as any program you find on google is detectable. 7z+img concatenation requires no special software on the recipient's part, just an archive program of any sort.

To be undetected you would need a tool with a custom algorithm and anyone you sent it to would need the same program.