Covert Channel Examples Using gpg to encrypt data on victim's machine, to transfer the encrypted data to our server, we can inject the data in icmp packets or dns request using scapy. After the encrypted data arrives at our server, we can decrypt the encrypted data using gpg key.