Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?
Once the relevant information is extracted, the tokens are placed back on the network to gain access.