By the time you’ve blocked everything that has potential to exfiltrate, you are left with a useless system.
As I saw on another comment “encode this document using cpu at 100% for one in a binary signalling system “