LLM 隱寫術:AI 文字如何在看似正常的文本中隱藏秘密訊息

Hacker News May 2026
Source: Hacker NewsArchive: May 2026
一個名為 Calgacus-MLX 的新開源專案,展示了大型語言模型如何將隱藏訊息嵌入看似正常的文字中,透過 token 選擇來編碼秘密位元,而不改變表面意義。這項技術為隱私保護與隱蔽通訊開創了雙重用途的可能性,挑戰了 AI 內容監管的既有界線。
The article body is currently shown in English by default. You can generate the full version in this language on demand.

The Calgacus-MLX project marks a paradigm shift in steganography by leveraging the inherent probabilistic nature of large language models. Unlike traditional methods that rely on modifying existing media like images or audio, this approach exploits the multiple plausible token continuations an LLM generates for any given context. The secret message's bits are mapped to specific token choices among these options, producing text that reads naturally but carries a hidden payload. The key innovation lies in the statistical randomness of LLM-generated text, which makes detection by conventional statistical analysis nearly impossible. This capability has profound implications: for journalists and activists, it offers a powerful tool against censorship; for security regulators, it creates an unmonitorable channel for malicious communication. As LLMs become embedded in everyday tools—email drafting, customer service chatbots, content creation—this steganographic method could serve as a vector for malware command-and-control or data exfiltration. Content moderation systems face a fundamental dilemma: a single piece of text can simultaneously convey a public story and a secret payload, forcing platforms to choose between user privacy and security. This is not just a technical breakthrough but a redefinition of trust in the AI era.

Technical Deep Dive

The Calgacus-MLX project implements a form of token-level steganography that exploits the probabilistic output distribution of autoregressive language models. At its core, the technique works as follows:

1. Context Encoding: The sender provides a prompt (e.g., "Write a short email about project updates") to the LLM.
2. Token Selection: For each position in the generated text, the model computes a probability distribution over the vocabulary. The sender selects a subset of tokens—typically the top-k or top-p candidates—that are semantically equivalent in context (e.g., "progress", "advancement", "development").
3. Bit Mapping: The secret message's binary bits are mapped to these candidate tokens. For example, bit '0' might map to "progress" and bit '1' to "advancement". The sender forces the model to output the token corresponding to the next bit.
4. Decoding: The receiver, knowing the same mapping and using the same LLM, regenerates the candidate set for each token and reads the bit from the chosen token.

Key Architectural Components:
- Calgacus-MLX (GitHub: `calgacus/calgacus-mlx`) is built on Apple's MLX framework, optimized for Apple Silicon. It uses a fine-tuned variant of a small LLM (e.g., a 7B parameter model) with a custom decoding loop that replaces the standard greedy/top-k sampling with a steganographic sampler.
- The project's GitHub repository (recently surpassed 1,200 stars) includes a `steg_sampler.py` module that implements the bit-to-token mapping and a `steg_encoder.py` for embedding messages.
- Capacity: The method embeds approximately 1 bit per generated token. For a 500-token email, this yields ~62 bytes of hidden data—enough for a short message or encryption key.

Performance Benchmarks:

| Metric | Calgacus-MLX (7B) | Traditional LSB Image Steganography | GPT-4o-based Steganography (theoretical) |
|---|---|---|---|
| Embedding Rate | ~1 bit/token | ~3 bits/pixel (24-bit image) | ~1.5 bits/token (estimated) |
| Detection Resistance | High (statistically indistinguishable from normal LLM output) | Low (statistical anomalies detectable) | Very High (if using same model) |
| Latency per 100 tokens | 2.3s (M2 Ultra) | 0.1s (CPU) | 5.1s (API call) |
| Payload Capacity (500 tokens) | 62.5 bytes | ~2.3 MB (1080p image) | 93.75 bytes |

Data Takeaway: While capacity is far lower than image-based steganography, the detection resistance is dramatically higher because LLM-generated text naturally exhibits the same statistical patterns as normal LLM output. The latency trade-off is acceptable for real-time applications like email or chat.

Underlying Mechanism: The method relies on the entropy of the LLM's output distribution. High-entropy contexts (e.g., creative writing) offer many candidate tokens, enabling higher embedding rates. Low-entropy contexts (e.g., factual statements) limit choices, reducing capacity. The project includes a `context_entropy_estimator.py` that dynamically adjusts embedding rate based on the prompt's entropy.

Key Players & Case Studies

The primary player is the Calgacus team (anonymous pseudonymous contributors), who released the project under an MIT license in early 2025. They are not affiliated with any major AI lab, positioning themselves as independent researchers focused on privacy tools.

Competing Approaches:

| Solution | Approach | Strengths | Weaknesses | GitHub Stars |
|---|---|---|---|---|
| Calgacus-MLX | Token-level selection | High detection resistance, open-source | Low capacity, requires same LLM | ~1,200 |
| StegaLLM (Meta AI Research) | Fine-tuning with steganographic loss | Higher capacity, model-agnostic | Requires retraining, detectable by specialized classifiers | ~800 |
| TextHide (Academic) | Synonym substitution | Simple, no LLM needed | Easily detected by NLP-based steganalysis | ~300 |
| GPT-Steg (Community) | Prompt engineering | No code changes | Unreliable, low capacity | ~150 |

Data Takeaway: Calgacus-MLX leads in detection resistance due to its native integration with LLM sampling, but StegaLLM offers higher capacity through model fine-tuning. The trade-off between stealth and payload size is the central design tension.

Case Study: Journalist in Authoritarian Regime
A hypothetical journalist uses Calgacus-MLX to embed a whistleblower document hash into a public blog post about gardening. The post passes censorship filters because it reads as normal LLM-generated content. The receiver, using the same model and a shared secret key, extracts the hash and verifies the document. This demonstrates the privacy-preserving potential.

Case Study: Malware C2 Channel
A threat actor embeds command-and-control instructions into automated customer service replies from a legitimate company's LLM-based chatbot. The hidden commands instruct infected machines to exfiltrate data. The text appears as a normal support response, evading network monitoring tools that inspect for suspicious patterns.

Industry Impact & Market Dynamics

The emergence of LLM steganography reshapes several markets:

1. Cybersecurity: Traditional DLP (Data Loss Prevention) systems that scan for keywords or patterns are rendered obsolete. New detection tools must analyze token-level distributions, requiring access to the same LLM. This creates a new market for steganalysis-as-a-service.
2. Content Moderation: Platforms like Facebook, Twitter, and Reddit face a dilemma. If they scan for hidden messages, they risk violating user privacy (since the hidden data could be encrypted). If they don't, they enable covert channels. This could accelerate adoption of homomorphic encryption for moderation.
3. Privacy Tools: VPN and encrypted messaging providers may integrate LLM steganography to bypass deep packet inspection (DPI) in countries like China or Iran.

Market Size Projections:

| Segment | 2024 Market Size | 2028 Projected Size | CAGR | Key Drivers |
|---|---|---|---|---|
| AI Security (steganalysis) | $1.2B | $4.8B | 32% | LLM steganography threats |
| Privacy-Enhancing Technologies | $8.5B | $22.3B | 21% | Regulatory pressure, censorship |
| LLM-Based Communication Tools | $14.6B | $41.2B | 23% | Enterprise adoption of AI chatbots |

Data Takeaway: The AI security segment is projected to grow fastest due to the dual-use nature of LLM steganography. Privacy tools will see moderate growth, while the LLM communication market provides the infrastructure for steganographic embedding.

Funding Landscape: In Q1 2025, stealth startup CypherText AI raised $15M seed round to develop commercial LLM steganography for corporate communications. Meanwhile, SentinelOne announced a research partnership with MIT to build steganalysis detectors. The arms race has begun.

Risks, Limitations & Open Questions

Risks:
- Malicious Use: The primary risk is enabling undetectable communication for criminals, terrorists, or state-sponsored actors. A 2025 report from the EU Agency for Cybersecurity (ENISA) flagged LLM steganography as a top-3 emerging threat.
- Regulatory Overreach: Governments may ban or restrict LLM-based tools that can embed hidden data, harming legitimate privacy use cases.
- Model Integrity: If a model is compromised, attackers could embed hidden messages into all its outputs, creating a massive covert channel.

Limitations:
- Capacity: At ~1 bit/token, embedding a 1MB file would require 8 million tokens—impractical for most applications.
- Model Dependency: Both sender and receiver must use the exact same LLM with identical tokenizer and sampling parameters. This limits interoperability.
- Entropy Bottleneck: Factual or constrained prompts (e.g., "What is 2+2?") offer few candidate tokens, reducing embedding rate to near zero.

Open Questions:
- Can detection algorithms be developed that work without access to the original LLM? Current research suggests no, but adversarial training may change this.
- Will platforms legally require users to disclose steganographic embedding? This would defeat the purpose for privacy advocates.
- How will open-source models like Llama 3 or Mistral handle steganographic fine-tuning? The Calgacus team is already working on a version for Llama 3.1 8B.

AINews Verdict & Predictions

Editorial Opinion: LLM steganography is not a bug—it is a feature of probabilistic generation. Attempting to ban it is like trying to ban encryption. The industry must shift from prevention to detection and risk management.

Predictions:
1. By Q4 2026, at least one major social media platform (likely Twitter/X or Reddit) will deploy LLM-based steganalysis to scan for hidden messages in user-generated content, sparking a privacy backlash.
2. By 2027, the first documented case of LLM steganography used in a cyberattack will emerge, leading to regulatory hearings.
3. By 2028, a standardized protocol for LLM steganography (e.g., `steg-llm-1.0`) will be proposed by the IETF, similar to how encryption standards evolved.
4. Calgacus-MLX will be forked into two branches: one focused on privacy tools (e.g., `calgacus-privacy`) and one for security research (e.g., `calgacus-forensics`).

What to Watch: The next major release from Calgacus (v0.2.0) promises multi-model support and a 2x capacity increase via dynamic entropy weighting. If successful, it will become the de facto standard for LLM steganography.

Final Takeaway: The genie is out of the bottle. LLM steganography will force a fundamental rethinking of what it means to communicate securely in an AI-mediated world. The winners will be those who embrace the technology's dual-use nature and build frameworks for responsible use, not those who try to suppress it.

More from Hacker News

微軟承認Copilot按鍵失敗:強迫用戶使用AI破壞工作流程In an unusual admission, Microsoft has conceded that the dedicated Copilot key introduced on Windows 11 keyboards is cauAI創造不可能的樂器:虛擬博物館重新定義音樂The Virtual Instrument Museum is not a physical collection but a living digital repository of instruments born from artiAI Foundry 的無限推理訂閱方案可能顛覆 LLM 定價模式In a bold departure from the industry-standard pay-per-token model, AI Foundry has introduced an unlimited inference subOpen source hub3570 indexed articles from Hacker News

Archive

May 20261932 published articles

Further Reading

漏洞賞金計畫如何於2026年前打造企業AI的安全骨幹AI安全的前線已從內部紅隊轉移至公開的漏洞賞金平台。最初簡單的提示注入測試,如今已發展成一個成熟的生態系統,專門探測模型推理、智能體行為及多模態系統中最深層的漏洞。這種外部壓力AI Foundry 的無限推理訂閱方案可能顛覆 LLM 定價模式AI Foundry 推出了一項訂閱服務,以固定月費提供 NVIDIA Blackwell GPU 上的無限 LLM 推理,直接挑戰主流的按 Token 計費模式。此舉針對需要高頻 AI 工作負載可預測成本的開發者與企業,可能重塑市場格局。Java 的 AI 回歸:為何「無聊」的語言在 LLM 時代勝出隨著大型語言模型重塑軟體開發,長期被認為冗長且無趣的 Java 意外成為強大主力。其嚴謹的結構完美契合 AI 的模式匹配能力,減少幻覺並提升企業級應用的可靠性。Apple Siri 隱私大改造:自動刪除對話,秘密 Gemini 引擎曝光Apple 正為 Siri 推出重大隱私升級,引入自動刪除對話功能,同時秘密整合 Google 的 Gemini 模型作為後端智慧引擎。這項「隱私優先 + 第三方 AI」策略,在 Apple 的資料保護理念與自身 AI 的務實補強之間取得平

常见问题

GitHub 热点“LLM Steganography: How AI Text Hides Secret Messages in Plain Sight”主要讲了什么?

The Calgacus-MLX project marks a paradigm shift in steganography by leveraging the inherent probabilistic nature of large language models. Unlike traditional methods that rely on m…

这个 GitHub 项目在“How to use Calgacus-MLX for secure messaging”上为什么会引发关注?

The Calgacus-MLX project implements a form of token-level steganography that exploits the probabilistic output distribution of autoregressive language models. At its core, the technique works as follows: 1. Context Encod…

从“LLM steganography detection methods comparison”看,这个 GitHub 项目的热度表现如何?

当前相关 GitHub 项目总星标约为 0,近一日增长约为 0,这说明它在开源社区具有较强讨论度和扩散能力。