A pure JavaScript steganography module that hides secrets inside text using invisible unicode characters, secured with passwords and encryption.
StegCloak is a pure JavaScript steganography module that hides secrets within plain text by compressing and encrypting data before cloaking it with invisible unicode characters. It solves the problem of covert communication by allowing users to embed information in texts that appear normal on social media, emails, or webpages, without detection.
Developers and security enthusiasts needing to watermark content, embed invisible scripts, or transmit hidden messages across platforms like Twitter, WhatsApp, or Gmail securely.
Developers choose StegCloak for its use of zero-width characters that are universally compatible, strong AES-256 encryption, and functional programming design, offering a balance of invisibility, security, and ease of integration via API, CLI, and web interfaces.
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses AES-256-CTR encryption and optional HMAC integrity checks, providing cryptographically secure protection for hidden secrets, as highlighted in the README's feature list.
Employs six zero-width unicode characters that work seamlessly on web platforms like Twitter, Gmail, and WhatsApp, ensuring cloaked text appears normal without altering visible content.
Can hide large texts, such as a Wikipedia page source (205k characters), within a short cover text in under a second, thanks to LZ and Huffman compression algorithms for payload reduction.
Offers multiple interfaces including an API module, CLI tool, and web interface with web worker optimization, making it adaptable for various development workflows.
Cannot directly hide binary files; requires uploading files to cloud storage and stegcloaking the link, adding complexity and external dependencies for file-based use cases.
As admitted in the README, if a warden is actively sniffing data, the unusual amount of zero-width characters can reveal hidden communication, compromising obscurity.
Being a JavaScript library, it may not integrate smoothly into server-side environments without additional configuration or polyfills, limiting use in non-Node.js contexts.