menu Home chevron_right
WEIRD

How Agents Hide Things | Deadly Survival Skills

Qxir | January 26, 2026



Taking a look at the book “100 Deadly Skills” written by former Navy Seal, Clint Emerson. This video discusses skills 51 to 60.

“You will learn how to escape a locked trunk, make an improvised Taser, trick facial recognition software, prevent tracking, evade a kidnapping, elude an active shooter, rappel down the side of a building, immobilize a bad guy, protect yourself against cyber-criminals, and much more — all using low-tech to “no-tech” methods.”
100 Deadly Skills: https://100deadlyskills.com/

Second Channel: https://www.youtube.com/channel/UCt93hxFmjppL5nLRAX94UrA
Merch: https://teespring.com/stores/qxir
Patreon: https://www.patreon.com/qxir
Twitter: https://twitter.com/QxirYT
Discord: https://discord.gg/jZzvvwJ
Twitch: https://www.twitch.tv/qxiryt/
Subreddit: https://www.reddit.com/r/Qxir/

Written by Qxir

Comments

This post currently has 46 comments.

  1. @bzirpoli

    January 26, 2026 at 2:26 pm

    "bad guys" is just how you call the other side in the military (especially in the US). its not a deeply moral thing. a commander wont send you to shoot the good guys, you wouldn't. this is why those are the bad guys.
    "enemy", "adversary" are for high level officials. grunts: go shoot the bad guy

  2. @Innosos

    January 26, 2026 at 2:26 pm

    Hiding information in pictures (steganography) is easy, but the how depends on the picture data type. Stuff like PNG has custom chunks you can create and allows you to just capsule whatever you want in that user-defined chunk without it affecting the picture. You can also do stuff like just adding text to the end of PNG since it is terminated and/or provides instructions on how far it has to read the image IIRC. Anything after that is ignored.

    Another more sophisticated method is to encode it into the image information itself by adding and subtracting imperceivable amounts of values to the bits. As long as you know how these small discrepencies that encode your data has been encoded, decoding it is rather trivial.

    And that's just PNGs. It's really simple and a common use case for hackers and ill-doers to get some payload onto their victims' computers after they gain access to your PC. Since most image sharing websites don't employ any sort of steganographic detection mechnanisms you simply upload the files to any of the image sharing hosts and command the victim's PC to download the affected images. And if you want to be extra covert, you don't upload all of the malicious code into one picture (cause it's gonna bloat the size of the image and make it easier to see something fishy is going on or even be detected by virus scanners (since most just check if a byte sequence matches a file)) but multiple and extract and restore the code across multiple images.

  3. @liorshalmay73

    January 26, 2026 at 2:26 pm

    what he meant by notpad, is literally opening the image with it and append your message to the end of the “gibberish”.
    Most image formats ignore everything that comes after the end of the image

  4. @Nylak-Otter

    January 26, 2026 at 2:26 pm

    I still have an SUV with this type of lock.

    Once you open the door, just pop the lock down and shut the door. Bam, relocked.

    I have locked my keys in that car SO MANY TIMES.

  5. @nobonux9843

    January 26, 2026 at 2:26 pm

    It does seem through some testing that it is possible to append text directly to the end of an image (at the start maybe if on windows).
    Just be careful to not upload it somewhere that reencodes it as that will destroy the text (so local or USB drives are the safest bet)

  6. @BenjaminSpencer-m1k

    January 26, 2026 at 2:26 pm

    Rinks security box, this was at a low point in my life..the hinge was on thd outside and had a steel rod that held it together,a small screw driver some taps and some pliers and i had it open. The rod easily slid back.in with a few taps. I did thos several times and no one new the diffrence.

  7. @luciddreaming9129

    January 26, 2026 at 2:26 pm

    The part about using string to open a car door is also rather difficult with modern cars because of the power lock function most cars have. You’d be better off finding a way to push the unlock button nowadays. Older models this works awesome with though.

  8. @CHE-Undercover

    January 26, 2026 at 2:26 pm

    I think it's mistaken with the drawing. Hackers and criminals hide Notes in files all the time. There is a way to make a note without messing up the picture. I've done it.

  9. @JC7419

    January 26, 2026 at 2:26 pm

    Open Notepad, leave the first two lines empty and type the text you want to hide.

    Then save it to the folder you want to use.

    Copy the JPG file you want to hide text in, to the folder with the saved text document.

    Open the Command Prompt.

    Use cd.. and navigate to the folder containing the picture and text file.

    Once in that directory, type the following:

    (Example)

    copy /b Name-of-image.jpg + Name-of–text-file.txt Name-for-new-image.jpg

    After this you should have a new image in the folder.

    To see the hidden text you need to open the image file with Notepad and scroll to the bottom.

  10. @AB-Prince

    January 26, 2026 at 2:26 pm

    the notepad thing makes the image not work. however you can get steganography programs that can encode any file into an image that is almost unnoticable

  11. @jacksonbauer5199

    January 26, 2026 at 2:26 pm

    Many of the things on the list are kinda weird. I have been interested in the world of clandestine intelligence gathering since I was a small child and have studied everything I could get my hands on for nearly 40 years now. Many agencies are actually “devolving” are regressing back to analog forms of communication because you can’t “hack” paper. As for the hiding places, there are so many excellent ones that Clint decided were “too cool” for civilians I guess and therefore left them out. Anyway, I fucking love this channel and I am going back through your catalogue and watching everything!!

  12. @sykoteddy

    January 26, 2026 at 2:26 pm

    I'm impressed that you realized and mentioned that Tails is a standalone operating system (actually Linux) and not a program. The point with it is to make a bootable USB and then boot a computer using this. In this way it's using the computers ram memory to run Tails, so anything you do or download disappear when the computer is turned off. That's also why need to connect to a open or a hacked wifi. If someone would get a hold of the computer, they could essentially check the mac address of the computer and link it to the logs of the WiFi and possibly other servers. But if you didn't leave any DNA or any other clue on the hardware you should be safe. I'm no hacker so I might miss something, but many hacker tools have a option to change or impose a Mac address to look some other connected device.

    Regarding hiding a message inside an image it is possible, I think however you might need to use a hex editor. Don't qout me on that though.

    But has for a long time been known that virus writers have used a technique similar to this, which I can't recall what it's called.

    One example of this is a hacker group who used the windows logotype image to hide a payload inside.

    Thanks for hilarious videos, I especially love the one with the Finnish soldier that OD's on meth. 🤘🙏

  13. @WhileTrueCode

    January 26, 2026 at 2:26 pm

    you could definitely embed text at the bottom of an image file (or really ANY file for that matter). the top is unlikely to work since most fileformats are expected to have binary header starting at the first byte of the file.

    yet, using regular notepad will likely corrupt the file since it wont preserve the entire 0..255 byte range once its interpreted everything into a character set. however, a hex editor or certain text editors like Notepad++ would handle this perfectly though.

    once modified properly, the file will still work normally. a recipient could open the file in regular notepad and scroll to the bottom to see the message.

    even though the book's method is super weaksauce insecure, its easy to train the technique (even to a computer noob) and doesnt require any specialized tools that could raise suspicion

  14. @Glo0ze

    January 26, 2026 at 2:26 pm

    About the car lock. its really easy to leave and lock the door. those old style car locks can be locked when the door is open and then you just close the door and its closed and locked

  15. @chrismurray5846

    January 26, 2026 at 2:26 pm

    A great way to hide text is in a sound file where it will sound like a bit of weird background noise, but becomes visible when the signal is run through a spectrograph.

  16. @zekethefreak4

    January 26, 2026 at 2:26 pm

    It’s funny that I never saw this video thing Is Back in 2017 I found out that I could turn a microphone into a speaker and realize I could use that against other devices

  17. @luckythegerman

    January 26, 2026 at 2:26 pm

    3:14 I am pretty sure that east german surveillance had radiator mounts bugged. Part of your house was a bug, spying on you. (StaSi in the DDR) They literally mounted a microphone in a piece of metal, used to hold up your radiator. A tiny hole on the side allowed sound to get to the microphone.

Comments are closed.




This area can contain widgets, menus, shortcodes and custom content. You can manage it from the Customizer, in the Second layer section.

 

 

 

  • play_circle_filled

    92.9 : The Torch

  • play_circle_filled

    AGGRO
    'Til Deaf Do Us Part...

  • play_circle_filled

    SLACK!
    The Music That Made Gen-X

  • play_circle_filled

    KUDZU
    The Northwoods' Alt-Country & Americana

  • play_circle_filled

    BOOZHOO
    Indigenous Radio

  • play_circle_filled

    THE FLOW
    The Northwoods' Hip Hop and R&B

play_arrow skip_previous skip_next volume_down
playlist_play