FINDING · DEFENSE

Meteor encodes bits by embedding a PRG-masked random value into the token-sampling randomness of a generative model, recovering bits proportional to the shared prefix length of the sampled interval. Expected throughput per sampling event is asymptotically within 1/2 of the Shannon entropy of the channel (proven in Appendix A), so Meteor automatically adapts to high entropy variability without explicit signaling or padding.

From 2021-kaptchuk-meteorMeteor: Cryptographically Secure Steganography for Realistic Distributions · §5 Meteor / §5.2 · 2021 · Computer and Communications Security

Implications

Tags

censors
generic
techniques
random-payload-detectml-classifier
defenses
steganographymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.