<DocScrutinizer05>
if you're smart, you make it spit out "%s isn't a directory" to STDERR, and other than that silently fail when it can't find your magic searchstring that marks the beginning of the hidden data
* DocScrutinizer05
thinks "do that on android" and shudders
<wpwrak>
anyway, good steganography would use something like: len = encrypt(buffer, key, data); p = image; for (i = 0; i != len; i++) for (j = 0; j != 8; j++) *p++ = (*p & ~1) | !!((buffer[i] >> j) & 1);
<wpwrak>
where "encrypt" would preferably have no easily recognized static content (header or such)
<DocScrutinizer05>
looks good but you don't want that in any plaintext file on your device, right?
<wpwrak>
yes, you don't carry such sophisticated hacker tools with you when crossing the border :)
<DocScrutinizer05>
sure you could simply `mv my-preferred-stegano-tool dir`
<DocScrutinizer05>
there are a few of them
<DocScrutinizer05>
but you never know if customs aka homeland security has a special version of file(1) for finding any such suspicious tools, even when they are binaries
<DocScrutinizer05>
don't know if ssh client is already suspicious to have on your linux device, but I don't see a less suspicious approach (except maybe browser embedded terminal)
<DocScrutinizer05>
and that would create trouble from browser history, unless you take special care to enter such embedded terminal only via 'interactive content' and not via a special URL