Information Theft
What does an encrypted file look like?
p. 583 Fig. 11-17
Next