You don't seem to understand what Steganography is and how it works. Perhaps you should read that article. You cannot produce illegal information out of non-illegal information without having that illegal information somewhere else to use as a key.
> My point is that you could unknowningly store illegal data, without blockchain being involved.
The problem with blockchain is that a full node will be knowingly storing and distributing illegal content (or at least is likely to held to be, once the chain is widely known to be infested with such content.) The only way to.stop is to stop storing and interacting with the chain.
With a torrent, you could be unknowingly doing so, but very easily stop doing so with the particular content once you discovered it (without abandoning torrents altogether), which may or not be a complete bar to liability but would probably result in generally more lenient treatment in any situation other than the government is targeting you and the actual offense is pure pretext, in which case the content hardly matters.
There are many non-blockchain scenarios where there is difficult-to-remove data. How would one deal with embedded illegal data stored in firmware? Public records?