Mojibake steganography
Each byte of input is encoded as a higher Unicode codepoint picked at random. Example: an A (U+0041) may become U+5E41 (a CJK ideogram). The resulting text is illegible at a glance, but decoding extracts each character's codepoint modulo 256 to recover the original byte. UTF-8-safe throughout.
Codepoint range (hex)
Warning: this is not encryption
This tool does reversible obfuscation without a key. Anyone who knows the algorithm can decode the message in seconds. It's for visual masking (e.g. making a message look like a random CJK string in a text editor), NOT for protecting secrets. For real encryption, use AES-256-GCM via libsodium or GPG.
Frequently asked questions
What is a mojibake tool actually useful for?
Why is the output different each time for the same input?
Does it support emoji and non-ASCII input?
Is it safe to hide passwords or sensitive info?
How does it work technically?
TextEncoder and TextDecoder, avoiding the legacy unescape/encodeURIComponent hack.Light obfuscation isn't enough? You need real encryption.
If you're looking for how to hide sensitive content in production, this tool is not what you need. I offer consulting on applied cryptography (libsodium, sealed boxes, encrypted columns in DB), key management with HSM/KMS, code audits for side-channel vulnerabilities and prompt injection in LLM agents. Concrete applied cybersecurity, not theoretical.
Talk to me about cryptography and security