It allows you to hide an image and/or text within a visible image.
Confidential uses the AES-256 bits encryption algorithm as well as other security measures. Moreover, the presence of the hidden data is undetectable. Confidential can be executed from a simple USB key. In addition to the main web browsers, Confidential is compatible with Tor Browser.
The software includes the management of authorizations to view data, whether for groups or individuals.
Some possibilities of using Confidential among many others:
Blog out of control of totalitarian regimes.
Concealing sensitive documents.
The image containing the hidden data is compatible with:
The social networks.
The Web sites and blog hosting providers.
The Email servers.
The free image hosting providers.
Confidential has its own reader which can be distributed free of charge.