The recursive visual posts at postliteracy.org require steganographic decoding in order to reveal their messages in their entirety. There are a variety of stego tools freely availably on the Web. We're using the utilities at Utility Mill to encode the images. We recommend postliteracy.org visitors use its sister decoder. These online tools are based on Lenny Domnitser's Stepic Python library.
There are also a plethora of downloadable tools. We haven't done widespread testing to see which ones work well with postliteracy.org images, so caveat decryptor. Drop us a line if you've had positive results from a particular tool, or if you've written a compatible stego decoder that you'd like us to link up here.
Zack Grossbart has written a Java-based application available at his Hackito Ergo Sum blog. We haven't tested the tool, however it's worth a visit just for his excellent explanation of how steganography works. (It's polymodal literate in a good way.)
OpenStego is another Java-based opensource stego application. It also uses LSB, but it looks for a file rather than a text string. At any rate, in our testing it hasn't been able to extract the hidden postliteracy.org text.
K. Hempstalk's Digital Invisible Ink Toolkit is stego utility written in Java and released under the GPL license. It can decode least significant bit encoding, but like OpenStego it looks for files. It probably won't work, but you never know.
BitCrypt is available for Windows in free and donation-ware versions. The text encoded in the images posted by postliteracy.org is not encrypted, although the steganographic algorithm it uses may not decode the encoding postliteracy.org uses.
All Contents Copyright © 2008 postliteracy.org