Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Distribution: Lots of distros in the past, now Linux Mint
Posts: 748
Rep:
If you mean metadata, like rch says, then most paint and webpage design programs will work. On the other hand, if you mean steganography (hiding information in pictures), then a search of google (steganography +linux) will give you all sorts of toys to play with.
Oh, BTW, as far as the steg programs are concerned, using them to do "really bad things" is not the best idea. They are good as an example of ways to hide information in other information, but for anything you don't want to end up in prison for, they're like sending out a beacon saying you're a bad guy.
I have an aquaintence that gets almost weekly scans by .gov-related addresses because her site is a picture-based site. For most law-abiding (or should that be mostly law abiding?) citizens, steg work is something interesting, but I thought I'd mention that it isn't exactly uncrackable. After all, steg's appeal is that it's hidden in plain sight.
Oh, BTW, as far as the steg programs are concerned, using them to do "really bad things" is not the best idea. They are good as an example of ways to hide information in other information, but for anything you don't want to end up in prison for, they're like sending out a beacon saying you're a bad guy.
I have an aquaintence that gets almost weekly scans by .gov-related addresses because her site is a picture-based site. For most law-abiding (or should that be mostly law abiding?) citizens, steg work is something interesting, but I thought I'd mention that it isn't exactly uncrackable. After all, steg's appeal is that it's hidden in plain sight.
I don't think you are right. Steganography MUST be used in conjunction with strong encryption and not alone.
For example steghide compress and encrypt the data using AES (by default) and only then it embeds the info into the cover file.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.