When comparing File Camouflage vs Tox, the Slant community recommends Tox for most people. In the question“What are the best ways to transmit sensitive information over the Internet?” Tox is ranked 6th while File Camouflage is ranked 8th. The most important reason people chose Tox is:
Tox uses military grade encryption and works completely peer-to-peer.
Ranked in these QuestionsQuestion Ranking
Pros
Pro Hides file in JPEG image
File Camouflage allows you to encrypt your sensitive information and then after hide it in the JPEG image of your choice. With this program an innocent family photo or photo of your pet can be used to disguise your most sensitive encrypted information.
Pro Effective second level of protection
File Camouflage is an effective second level of protection. After encrypting and password protecting your sensitive information with AES, File Camouflage makes sure only your intended recipient knows there is even a file to decrypt by hiding it in a JPEG.
Pro Easy to use
Hiding your sensitive information with File Camouflage is extremely easy. The whole process is explained very well even for an inexperienced user.
Pro Free
Pro Ability to send an EXE file via email
Many email providers are not able to send EXE files but File Camouflage not only protects it but allows the file to be sent.
Pro Privacy focused
Tox uses military grade encryption and works completely peer-to-peer.
Pro Free and open source
The code is licensed under GPL (may change in the future) and is available on GitHub.
Pro Multiple front-ends for multiple platforms available
At the moment there is no official Tox client, but a selection of 32 and 64 clients for Windows, OS X, Linux and Android is available.
Cons
Con Encourages improper use of steganography
To hide a file in an image you need two things:
One, that the attacker cannot find the source image i.e. it has to be an image made by the user (preferably a photograph of a visually complex scene) and never put on the internet (using the pac_tron image would render the use of steganography moot, as the attacker can merely subtract a suspect image from a copy of the source image) and
two, that the file to be hidden is smaller than the cover image. With the best techniques today you can embed a file about 10% of the size of the cover image. The example in the doc hides a file 21,500% of the size of the cover image.
If you use steganography improperly you get no security, esp. as governments believe senior terrorists use steganography and thus search for it very, very, carefully.
Con Frequently prompts you to donate
File Camouflage is free although the developer does proclaim it "donationware." As a result the program frequently and annoyingly begs that you donate.
Con Requires both sender and recipient to use File Camouflage
In order for the recipient to receive the intended information they have to download and use File Camouflage.
Con Early stages of development
Since Tox is relatively new, it has important features missing (like group video) and requires a proper code review before it can be deemed reliable and ready for everyday use.