2c2.tgz...

- AV AC AU C I A
发布: 2003-11-21
修订: 2025-04-13

2c2 implements a deniable (and thus subpoena-proof) encryption by creating a file that can be decrypted into several variants, depending on the key, and for which the presence of any of the variants cannot be detected without knowing the key. Please don't use it for an evil conspiracy to take over the world, mmmkay? Also check out James's 4c, a successor to this tool.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息