When comparing File Camouflage vs Riot, the Slant community recommends Riot for most people. In the question“What are the best ways to transmit sensitive information over the Internet?” Riot is ranked 6th while File Camouflage is ranked 7th.
Ranked in these QuestionsQuestion Ranking
Pro Hides file in JPEG image
File Camouflage allows you to encrypt your sensitive information and then after hide it in the JPEG image of your choice. With this program an innocent family photo or photo of your pet can be used to disguise your most sensitive encrypted information.
Pro Effective second level of protection
File Camouflage is an effective second level of protection. After encrypting and password protecting your sensitive information with AES, File Camouflage makes sure only your intended recipient knows there is even a file to decrypt by hiding it in a JPEG.
Pro Easy to use
Hiding your sensitive information with File Camouflage is extremely easy. The whole process is explained very well even for an inexperienced user.
Pro Ability to send an EXE file via email
Many email providers are not able to send EXE files but File Camouflage not only protects it but allows the file to be sent.
Pro Uses Matrix, the open communications protocol
Pro Supports text, voice, video
Integrates with Jitsi for multi-party video chats
Pro Widgets support
Want to watch that flick at YouTube and discuss it at the same time? Have Grafana graphs stacked above your DevOps team chat? Collaboratively edit Google Docs and chat over without switching applications? This is possible with Riot.
Pro Bridges to other networks
You're not confined within Riot's or even Matrix garden, and you don't have to make users of other networks switch to Matrix.
Pro Web and mobile (iOS, Android) versions available
Pro Very good and simple interface
Riot has a very simple interface, adding the ability for more unexperienced PC-Users to use it.
Con Frequently prompts you to donate
File Camouflage is free although the developer does proclaim it "donationware." As a result the program frequently and annoyingly begs that you donate.
Con Requires both sender and recipient to use File Camouflage
In order for the recipient to receive the intended information they have to download and use File Camouflage.
Con Encourages improper use of steganography
To hide a file in an image you need two things:
One, that the attacker cannot find the source image i.e. it has to be an image made by the user (preferably a photograph of a visually complex scene) and never put on the internet (using the pac_tron image would render the use of steganography moot, as the attacker can merely subtract a suspect image from a copy of the source image) and
two, that the file to be hidden is smaller than the cover image. With the best techniques today you can embed a file about 10% of the size of the cover image. The example in the doc hides a file 21,500% of the size of the cover image.
If you use steganography improperly you get no security, esp. as governments believe senior terrorists use steganography and thus search for it very, very, carefully.