http://status.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/steganography/index.html
In order to thwart analysis of metadata, communicate through one or multiple uninvolved third party dead-drops , preferably such with broad distribution (i.e. popular websites, like social media or message/image boards). When relying on such third parties, steganography can help circumventing censors . If an adversary controls a critical link in the network and blocks all communications they can't inspect, you need to conceal your encrypted communications inside of...