{"id":658775,"date":"2013-05-17T15:57:05","date_gmt":"2013-05-17T19:57:05","guid":{"rendered":"http:\/\/betanews.com\/?p=151607"},"modified":"2013-05-17T15:57:05","modified_gmt":"2013-05-17T19:57:05","slug":"steganpeg-lets-you-hide-personal-data-in-plain-sight","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/658775","title":{"rendered":"SteganPEG lets you hide personal data in plain sight"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-64949\" title=\"woman mask cloak hide anonymous\" src=\"http:\/\/betanews.com\/wp-content\/uploads\/2012\/03\/woman-mask-cloak-hide-anonymous-240x300.jpg\" alt=\"\" width=\"240\" height=\"300\" \/>While it\u2019s unlikely that the fate of your nation depends on it, there may be times when being able to pass on sensitive files to other people is a necessity. The obvious example is to encrypt those files in some way, either by storing them in a password-protected location or by encrypting them on the fly before passing them on.<\/p>\n<p>The problem with this approach is that it\u2019s rather visible. Your encrypted files by their very nature advertise the fact they contain some form of sensitive data, attracting unwanted attention. So what can you do about it? The answer lies with steganography, and a free tool for Windows called <a href=\"http:\/\/www.downloadcrew.com\/article\/30285-steganpeg\" >SteganPEG 1.0<\/a>.<\/p>\n<p>Steganography has a long history, dating back to Ancient Greek times when it was the process of writing hidden messages in such a way as only the sender and intended recipient would know they existed. With the rise of computers, steganography has taken on a different slant, whereby information &#8212; typically entire files &#8212; are hidden away inside other files.<\/p>\n<p>The key to making steganography effective is by drawing no attention whatsoever to the existence of the hidden file. That means the host file must appear to function completely normally, so opening it arouses no suspicion. One of the best ways of doing this is by hiding your files inside images, which open up like any other image, betraying no evidence of the files stashed away inside.<\/p>\n<p>This is how SteganPEG functions &#8212; once installed, fire up the program and you\u2019ll immediately see it\u2019s required for both creating the stenographic file and extracting the hidden files from it later, so your recipient will need their own copy. You also assign a password to your file, which is required in order to unlock its contents. It\u2019s unlikely encryption is involved here, but as the key thing is to simply hide away the file, it\u2019s not necessarily important, unless you\u2019re peddling state secrets, of course.<\/p>\n<p>Once assigned, pick your chosen JPEG image. When picking an image, make sure it\u2019s not just large enough to store the files you wish to hide away inside, but also not too compressed. SteganPEG works by recompressing the original image to free up enough space for your files to reside in without increasing the size of the original image. This ensures it doesn\u2019t stick out like a sore thumb, but it does mean you may have to try different images before you find one that has enough flexibility for hiding your chosen file or files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-151608 alignleft\" title=\"SteganPEG\" src=\"http:\/\/betanews.com\/wp-content\/uploads\/2013\/05\/SteganPEG-300x212.jpg\" alt=\"\" width=\"300\" height=\"212\" \/>You can add multiple files to a single JPEG image so long as they won\u2019t increase the size of the original file &#8212; a progress bar handily tells you how much space you\u2019ve got left to play with. Once complete, click the Save Stegged Image button to save a copy of the file.<\/p>\n<p>You can open this file like any other, then send it on to its intended recipient, who fires up their copy of SteganPEG, chooses &#8220;Read files from a JPEG image&#8221;, supplies the password and then loads the file in. If all is well, they can then save the original files out of the image, all without hopefully arousing any suspicion whatsoever.<\/p>\n<p><a href=\"http:\/\/www.downloadcrew.com\/article\/30285-steganpeg\" >SteganPEG 1.0.0<\/a> is available now as a free, open-source download for PCs running Windows XP or later. XP and Vista users will also need <a href=\"http:\/\/www.downloadcrew.com\/article\/4339-microsoft_net_framework\" >.NET Framework 3.5<\/a> or later installed.<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=OM6jz35toCQ:bO8C3Jw5558:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=OM6jz35toCQ:bO8C3Jw5558:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/bn\/~4\/OM6jz35toCQ\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While it\u2019s unlikely that the fate of your nation depends on it, there may be times when being able to pass on sensitive files to other people is a necessity. The obvious example is to encrypt those files in some way, either by storing them in a password-protected location or by encrypting them on the [&hellip;]<\/p>\n","protected":false},"author":7432,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-658775","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/658775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/7432"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=658775"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/658775\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=658775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=658775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=658775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}