. >k .d``
.@8Ned8" . @8Ne. .u
.@^%8888" .udR88N %8888:u@88N
x88: `)8b. <888'888k `888I 888.
8888N=*8888 9888 'Y" 888I 888I
%8" R88 9888 888I 888I
@8Wou 9% 9888 uW888L 888'
.888888P` ?8888u../ '*88888Nu88P
` ^"F "8888P' '88888F`
\ Stego Crypto Praxis /
:: Archive of Steganographic Content ::
is the greatest steganographic oddity
ever, and for good reason
Here are the links to their twitter
), and a strong theory
The Polish Plague Doctor
stego disc that circulated around some tech circles.
This is a particularly interesting excersize in steganography because of how many
pieces of data are hidden in a single file, the pieces of which are still being
figured out. Not to mention, it is strongly themed around the black plauge; spooky.
The Voynich Manuscript
was a linguistic oddity. Just recently there was a
that showed the text was written in ancient Turkic. It is still one
of the most famous cases of obscured texts. Here is a link to the full text
well as a transcription
of the symbols used.
The Library of Babel
can be used to send messages, as technically everything is
already written in it
. There is also a similar function for images called Babelia
in which all images in the 640x416 dimension range theoretically already exist
Stego tools using similar functions are incredibly underutilized.
is an obscure website with very little public documentation on it. There
have been a few people who have tried to crack it but I have no idea if the full
thing has been solved yet.
:: Miscellaneous Resources ::
) is a robust steganography tool for media-file manipulation.
Online image metadata viewer
download plus GUI
is an online cipher suite (sourcecode
and text tools
are audio spectrometers; full-featured DAWs work too.
is an alternative for the now-defunct G-Mask
image manipulation software.
is possible by utilizing the blank/null characters in UTF-8.
is a browser plugin for jpeg stego on the fly.
is the industry standard for learning and using cryptographic techniques.
is good for steganography using maths; this includes audio
Use a Diceware
list for strong entropy generation in passwords.
is and how to do it; photomosh
for image/video manipulation.
What OTR fingerprinting
is in general, plus downloads
, and the EFF guide
is in general, a GPG download
, public database
), and PGP Stealth
Learning how to crack basic to advanced ciphers is an important and useful skill;
hosts many of these kinds of challenges including still-unsolved
historical challanges, some of which have significant prize money attached to them.
There are similarly-styled puzzles hosted on /r/bitcoinpuzzles
which all have prize
money associated with them as well.
01010110 01101001 01110110 01100001 00100000 01000011 01100001
01101100 01101001 01100111 01110101 01101100 01100001 00100001