-
Hello,
first of all thank you for a wonderful module, I'm using it to learn steganography.
I successfully hid and revealed text messages in images, but I'm having trouble revealing a hidden file wi…
-
Trying to unhide a png with a hidden text, recieving that error:
`python LSBSteg.py -steg-image steganography_lsb.png -out steg.bin
Traceback (most recent call last):
File "LSBSteg.py", line 24…
-
Hello, is this project still alive?
I have developed a similar program in python and I'm interested about the methods this program uses.
How do the hiding algorithms work? Has it been tested if they…
-
Hi and thanks for this project.
In the [project page](http://grub.johnlane.ie/), I see no example method with both:
- **deniable encryption** achieved by:
- full disk encryption (no plain keyfile e…
-
Correct "stenography" to "steganography" in a few slides.
- _Stenography:_ the action or process of writing in shorthand or taking dictation.
- _Steganography:_ the practice of concealing messages or …
-
If we decouple new onboarding work from privacy theme, we still need webmaker.org content/landing page for MoCo's Privacy Day campaign.
As background, one of the primary CTA's in this engagement cam…
-
Originally written by @TTMTT. That we hope for him safery and peace
.
Wow, ipod touch 5G (8.1) - iCL0udin v1.0 bypass activation (icloud)
http://youtu.be/tZmEdlDGNu4
iCL0udin v1.0 bypass activation…
TTMTT updated
9 years ago
-
Use of this application IMMEDIATELY renders people's communications 'interesting' to any surveillance apparatus.
This is a major drawback and should more prominently discussed for the security of th…