FINDING · DEPLOYMENT

Assemblage inherits the bootstrapping limitation of all generative steganographic schemes: sender and receiver must share a symmetric key before communication begins. Public-key steganography exists in theory but does not currently support common image/text channels efficiently. The paper identifies three viable deployment scenarios: (1) travelers who carry a pre-shared secret before entering a censored region; (2) users in countries with episodic censorship who establish the key during uncensored periods; (3) a hybrid where a one-time signaling channel establishes the secret, after which Assemblage carries subsequent traffic.

From 2026-jois-assemblageAssemblage: Chipping Away at Censorship with Generative Steganography · §5 (Bootstrapping) · 2026 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
dpi
defenses
steganography

Extracted by claude-sonnet-4-6 — review before relying.