Found in 1 comment on Hacker News
crpatino · 2015-10-26 · Original thread
This technique has been publicly known for well over a decade. See: http://www.amazon.com/Information-Techniques-Steganography-D...

It's been a long time since I read it, but if I recall correctly, the UK government has been encoding the identity of the receiver of highly sensible information in this fashion for a long time. Probably it is SOP by now in most environments where truly important secrets are exchanged.

Fresh book recommendations delivered straight to your inbox every Thursday.