What they're not telling you: # STEGANOGRAPHIC GAME PROTOCOL REVEALS HOW INTELLIGENCE AGENCIES HIDE COMMUNICATIONS INSIDE MUNDANE FILE SYSTEMS A Perl-based software package called GobanFTP, publicly posted to GitHub by user molang163 and surfaced on Hacker News, demonstrates a working method for encoding complex sequential data—including real-time communications—entirely within FTP directory structures and filenames, rendering the actual content of files irrelevant to message recovery. The code is live, documented, and functional. No federal agency has issued guidance on detecting or preventing its use in classified networks.
What the Documents Show
The official position from the National Security Agency and the Defense Counterintelligence and Security Agency is that data exfiltration and covert communication within government systems are prevented through content inspection, DLP monitoring, and protocol filtering. That position is now demonstrably incomplete. GobanFTP's core mechanism—storing information exclusively in "enumerable names" rather than file contents, modification times, or byte sequences—means that standard monitoring systems checking for suspicious file transfers will detect nothing. A Go game move encoded as a filename like "move_d4.txt" containing a single space character will pass through every content-filtering system ever deployed. The technical documentation is unambiguous.
Follow the Money
The README explicitly states that the replay system "ignores file bytes, file size, mtime, listing order, server order, sidecars, projections, and tmp entries." A user can move pieces—and transmit information—using only directory and filename enumeration. FTP listing commands, ordinary and unremarkable on any government network, become a covert channel. The developer, identified only as molang163, has published full source code under a public license with no apparent attempt at obfuscation or restriction of access. What makes this particularly damaging is that GobanFTP was not designed for this purpose. It is a legitimate game engine. But the protocol it demonstrates—treating filesystem metadata as a communication layer—has immediate military and intelligence applications that every CISO at every Three-Letter Agency understands and has done nothing to prevent.
What Else We Know
The National Institute of Standards and Technology has issued no alert. The FBI's Cyber Division has issued no guidance to cleared contractors. The Defense Information Systems Agency has not circulated a memorandum to network administrators at COCOM level or below. Molang163 is a developer in what appears to be Japan or China based on README translations in those languages. There is no evidence the person works for a state intelligence service. There is every indication the code is exactly what it purports to be: a clever proof-of-concept that government security infrastructure cannot stop.
Primary Sources
- Source: Hacker News
- Category: Government Secrets
- Cross-reference independently — don't take our word for it.
Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.