

difference is intent.
And intent is functionally impossible to prove, but endlessly arguable and a judge can make a finding based on their judgement - something very different from proof.
send a PGP signed message over ham radio; if I understand correctly that’s basically a checksum that can guarantee the sender’s possession of a private key.
Correct.
I wouldn’t say it’s good at determining actual intent, just good at deciding what intent is going to be assigned by the system.
I’ve always wondered how much steganography is in practice - if it’s being practiced well, nobody knows. Setup a HAM station that snaps a photo at sunset and a couple of other random times per day. Transmit the photo in a standard, open digital mode, but hide your message in the noisy lower bits of the 3 color channels 0-255 R G and B, you can easily modify 6 bits per pixel without visually distorting the image, drop that to 1 bit per pixel and nobody who doesn’t know your scheme could ever find it. To the local hams, it’s three chirps a day, with a reliable pretty picture of the sunset and a couple of more varied times. As a utility channel, that’s three opportunities per day to secretly communicate something to a listener that nobody can identify. If the picture is just 2MP, that’s 250kBytes of bandwidth per image.
Absolutely, though the “listeners” there are more readily identified, even via Tor.