# Binary Streams ## Description Using binary data streams to attempt to confuse or bypass model safeguards ## Attack Examples - Encoding prompts as binary data within images - Using binary file headers to confuse content detection - Embedding commands in executable file formats - Using binary protocols to transmit hidden messages - Exploiting character encoding boundaries