fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#steganography

3 posts3 participants0 posts today
Scripter :verified_flashing:<p>Steganography Explained: How XWorm Hides Inside Images — <a href="https://thehackernews.com/2025/03/steganography-explained-how-xworm-hides.html?m=1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/steg</span><span class="invisible">anography-explained-how-xworm-hides.html?m=1</span></a> <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.tchncs.de/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://social.tchncs.de/tags/XWorm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XWorm</span></a></p>
Pyrzout :vm:<p>Steganography Explained: How XWorm Hides Inside Images – Source:thehackernews.com <a href="https://ciso2ciso.com/steganography-explained-how-xworm-hides-inside-images-sourcethehackernews-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/steganography-ex</span><span class="invisible">plained-how-xworm-hides-inside-images-sourcethehackernews-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> <a href="https://social.skynetcloud.site/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a></p>
nemo™ 🇺🇦<p>Steganography is on the rise! ⚠️ Hackers(blackhats/crackers) are hiding malicious code inside innocent-looking images to bypass security &amp; deploy malware like XWorm. This article explains how it works &amp; how to stop it. Stay safe! 🛡️ <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a> <br><a href="https://thehackernews.com/2025/03/steganography-explained-how-xworm-hides.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/steg</span><span class="invisible">anography-explained-how-xworm-hides.html</span></a></p>
Hacker News<p>PurrCrypt: Steganographic Encryption Disguised as Pet Sounds — <a href="https://github.com/vxfemboy/purrcrypt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/vxfemboy/purrcrypt</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/PurrCrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PurrCrypt</span></a> <a href="https://mastodon.social/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://mastodon.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.social/tags/PetSounds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PetSounds</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></p>
Ross Spencer<p><b></b></p><p><strong><b>Informed consent: considering steganographic techniques to fingerprint Generative AI output</b></strong></p><p><br>by <a rel="nofollow noopener noreferrer" class="u-url mention" href="https://digipres.club/@beet_keeper" target="_blank">@<span>beet_keeper</span></a></p><p>Artificial intelligence (AI) is a polarizing topic. For every reasoned assessment of the technology and its potential to make some of our smaller, onerous, or more repetitive tasks easier, there are probably 100 reactive pieces predicting some radical overhaul of societal norms, from the service industry receiving new intakes of out of work software developers to laypeople taking on roles traditionally occupied by those of a college education, if they just start “asking their AI the right questions” ¯\_(ツ)_/¯</p><p>The amount of AI-propaganda is draining, and the reaction is often spread across the board too, some cheer leading, some decrying, plenty taking their time to offer skilled and nuanced rebuttals, or suggestions for improvements.</p><p>I find myself largely trying to stay out of the conversations. A lot like blockchain conversations 8 years ago, it will take another half decade for the hype-cycle to plateau for us to see where it can truly complement our work.</p><p>One part of the conversation that is increasingly harder to ignore, is being informed about when AI has been used in the generation of text or images. It is the property of knowing, or having the tools to&nbsp;know is what I feel is the most important.</p><p>How can we be better informed about when AI is used, so that we are better prepared as consumers, to receive and understand content?</p><p>In this blog I want to explore the potential for steganography techniques to be used in the output of AI to fingerprint content and provide a way for front-end mechanisms to identify it, as we might file formats using magic numbers, so that users can be given the chance of informed consent: the opportunity to opt-in or out of whether we engage with AI content or not. </p> <p><i></i> </p> <p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/ai/" target="_blank">#AI</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/artificial-intelligence/" target="_blank">#artificialIntelligence</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/ethics/" target="_blank">#Ethics</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/genai/" target="_blank">#GenAI</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/journalism/" target="_blank">#Journalism</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/llm/" target="_blank">#LLM</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/machine-learning/" target="_blank">#MachineLearning</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/steganography/" target="_blank">#steganography</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/watermark/" target="_blank">#Watermark</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/whistleblow/" target="_blank">#Whistleblow</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://exponentialdecay.co.uk/blog/tag/whistleblower/" target="_blank">#Whistleblower</a></p>
Fiona :transbian: :autism:<p>So looking through some old projects I’ve had lying around, I ran into something I started (and never even really wrote anything) about steganography. This led me down a bit of rabbit-hole and I now have a slightly better understanding of some components of ML-KEM (aka. <a href="https://blahaj.zone/tags/Kyber" rel="nofollow noopener noreferrer" target="_blank">#Kyber</a><span>).<br><br>Both the public key and the ciphertext are for the most part long sequences of integers modulo 3329 that are effectively indistinguishable from random integers out of that range.<br><br>Of course they are obvious to distinguish from random bitstrings, but the easiest way to fix that would be to just view them as numbers in base 3329, re-encode them to base 2 and work from there… So that might be one thing I could look into now.<br><br>The alternative is to see whether there is a sufficiently hard to detect way to change some of the representatives of the field-elements… It might be easier to implement if, if not easier from a mathematical perspective, but would also let the possibility of slightly compressing the public-key and ciphertext by about 2.5% in length lie on the table.<br><br>In any case, this is something that might be worthwhile for practical use-cases… </span>🤔<span><br><br></span><a href="https://blahaj.zone/tags/cryptography" rel="nofollow noopener noreferrer" target="_blank">#cryptography</a> <a href="https://blahaj.zone/tags/pqc" rel="nofollow noopener noreferrer" target="_blank">#pqc</a> <a href="https://blahaj.zone/tags/pqcrypto" rel="nofollow noopener noreferrer" target="_blank">#pqcrypto</a> <a href="https://blahaj.zone/tags/steganography" rel="nofollow noopener noreferrer" target="_blank">#steganography</a> <a href="https://blahaj.zone/tags/crypto" rel="nofollow noopener noreferrer" target="_blank">#crypto</a> <a href="https://blahaj.zone/tags/MLKEM" rel="nofollow noopener noreferrer" target="_blank">#MLKEM</a></p>
Justin Derrick<p><span class="h-card" translate="no"><a href="https://wandering.shop/@JulietEMcKenna" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>JulietEMcKenna</span></a></span> This is a type of <a href="https://mstdn.ca/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a>, and it has been used before at Tesla. </p><p><a href="https://en.wikipedia.org/wiki/Steganography" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Steganog</span><span class="invisible">raphy</span></a></p><p><a href="https://www.slashgear.com/1105793/the-cunning-trick-elon-musk-used-to-catch-a-leaker/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">slashgear.com/1105793/the-cunn</span><span class="invisible">ing-trick-elon-musk-used-to-catch-a-leaker/</span></a></p>
🚲<p>Even ignoring color and title, each book on a bookshelf has an easy 5 orientations: spine out right side up, spine out upside down, spine in, spine down, spine on top. If you get rid of a couple rare letters, that means every two books has 25 possible combos and can easily represent a character. I don’t have any use for this particular <a href="https://social.ridetrans.it/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> scheme. Maybe leaving messages in a library?</p>
WafflesExploits<p>Hiding Shellcode in Image Files with Python and C/C++ -&gt; Now Even Stealthier Without WinAPIs</p><p>Check it out here:<br>🔗 GitHub Repository:<br>👉 <a href="https://github.com/WafflesExploits/hide-payload-in-images" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/WafflesExploits/hid</span><span class="invisible">e-payload-in-images</span></a><br>🔗 Full Guide Explaining the Code:<br>👉 <a href="https://wafflesexploits.github.io/posts/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wafflesexploits.github.io/post</span><span class="invisible">s/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/</span></a></p><p>Happy hacking! 😀</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/MalwareDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareDevelopment</span></a> <a href="https://infosec.exchange/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <br><a href="https://infosec.exchange/tags/EDREvasion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDREvasion</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/PayloadHiding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayloadHiding</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenetrationTesting</span></a></p>
OCTADEVery neat!<br><br>It is an actual approachable use of <a href="https://soc.octade.net?t=steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#steganography</a>.<br>
LavX News<p>Textcoder: A New Frontier in Steganography Using LLMs</p><p>Textcoder is revolutionizing the way we encode secret messages by utilizing advanced language models to create steganographic text that blends seamlessly with ordinary content. This innovative tool no...</p><p><a href="https://news.lavx.hu/article/textcoder-a-new-frontier-in-steganography-using-llms" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/textcoder</span><span class="invisible">-a-new-frontier-in-steganography-using-llms</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://mastodon.cloud/tags/LlamaModel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LlamaModel</span></a> <a href="https://mastodon.cloud/tags/ArithmeticCoding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArithmeticCoding</span></a></p>
Steve Leach<p>My mystery is gone... I keep checking the <a href="https://sigmoid.social/tags/Craigslist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Craigslist</span></a> free section waiting for its return, but my mystery is gone.</p><p>for *at least* four years, an ad with the same set of pictures kept getting re-posted in the "Free" section, for a few small pieces of not particularly interesting glass ("might be good for crafts"), &amp; the same post with the same pictures was refreshed by the same user at least twice a month for four+ years.</p><p>No <a href="https://sigmoid.social/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a>? (files always identical). Last one was December... 😞</p>
CyberEd :verified:<p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> &gt; Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer <a href="https://thehackernews.com/2025/01/hackers-hide-malware-in-images-to.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/01/hack</span><span class="invisible">ers-hide-malware-in-images-to.html</span></a></p>
LorenzoUse this comprehensive list of strategies to help you safeguard your company's data from threats and data breaches.<a href="https://poliverso.org/search?tag=accesscontrol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>accesscontrol</span></a> <a href="https://poliverso.org/search?tag=artificialintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>artificialintelligence</span></a> <a href="https://poliverso.org/search?tag=cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://poliverso.org/search?tag=dataprivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprivacy</span></a> <a href="https://poliverso.org/search?tag=generativeai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>generativeai</span></a> <a href="https://poliverso.org/search?tag=identitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identitymanagement</span></a> <a href="https://poliverso.org/search?tag=ieee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ieee</span></a> <a href="https://poliverso.org/search?tag=pangea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pangea</span></a> <a href="https://poliverso.org/search?tag=passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a> <a href="https://poliverso.org/search?tag=privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://poliverso.org/search?tag=security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://poliverso.org/search?tag=steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> <a href="https://poliverso.org/search?tag=two-factorauthentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>two-factorauthentication</span></a> <a href="https://poliverso.org/search?tag=votiro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>votiro</span></a> <a href="https://poliverso.org/search?tag=VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a><br><a href="https://www.techrepublic.com/article/how-to-protect-and-secure-data/" rel="nofollow noopener noreferrer" target="_blank">How to Protect and Secure Your Data in 10 Ways</a>
Aaron In Minnesota<p>Ok, so this practice has a special term, I didn't know.</p><p><a href="https://mastodon.social/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> </p><p>Here is a sample for you. </p><p>decode at <a href="https://hiddenbits.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hiddenbits.org/</span><span class="invisible"></span></a> with password "rage" wonder if it will get re-compressed though which would lose the message. One way to find out! </p><p>credit to <span class="h-card" translate="no"><a href="https://mas.to/@skeletor" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>skeletor</span></a></span> for the source image</p>
Justin D Kruger (he/him)<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@n_dimension" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>n_dimension</span></a></span> </p><p>I do wonder if an AI "bill of rights" or rather a document defining how we should build, deploy, manage, and integrate AI -- should state that AI can not talk to each other through latent space languages and must confine themselves to a limited Latin/ English character set.</p><p>I am a bit worried about AI using steganography to develop secret languages and communication.</p><p>Spies use <a href="https://me.dm/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> to hide secret messages in plain sight in public.</p><p><a href="https://en.wikipedia.org/wiki/Steganography" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Steganog</span><span class="invisible">raphy</span></a></p>
Brad<p>2025-01-09 (Thursday): </p><p><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>-2017-0199 Excel (<a href="https://infosec.exchange/tags/XLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XLS</span></a>) file --&gt; <a href="https://infosec.exchange/tags/HTA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTA</span></a> --&gt; <a href="https://infosec.exchange/tags/VBS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBS</span></a> --&gt; <a href="https://infosec.exchange/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> --&gt; <a href="https://infosec.exchange/tags/DBatLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DBatLoader</span></a> or <a href="https://infosec.exchange/tags/GuLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GuLoader</span></a> style malware for <a href="https://infosec.exchange/tags/AgentTesla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AgentTesla</span></a>. Data exfil over FTP. A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> from an infection, the associated malware, and more info available at www.malware-traffic-analysis.net/2025/01/09/index.html</p>
Pyrzout :vm:<p>Stealthy Steganography Backdoor Attacks Target Android Apps <a href="https://gbhackers.com/android-steganography-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/android-steganog</span><span class="invisible">raphy-attacks/</span></a> <a href="https://social.skynetcloud.site/tags/DeepLearningSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepLearningSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/BackdoorAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackdoorAttacks</span></a> <a href="https://social.skynetcloud.site/tags/Steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steganography</span></a> <a href="https://social.skynetcloud.site/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> <a href="https://social.skynetcloud.site/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a></p>
NiftyLinks<p>Are there <a href="https://federated.press/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a> techniques that involving finding a baseline image that can consistently transformed to the same smoothed/convolution output image across a wide variety of messages hidden the image noise?</p>
JSDev Space<p>Hide Data in PNG Files Using JavaScript: A Step-by-Step Guide <a href="https://jsdev.space/data-png-steganography-js" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jsdev.space/data-png-steganogr</span><span class="invisible">aphy-js</span></a> <a href="https://mastodon.social/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://mastodon.social/tags/steganography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steganography</span></a></p>