[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]

/comms/ - COMMS

anons talking with anons to anons about anons anonymously
Name
Email
Subject
REC
STOP
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webp,webm, mp4, mov, pdf
Max filesize is16 MB.
Max image dimensions are15000 x15000.
You may upload5 per post.


Index | Catalog | /qresearch/ | /projectdcomms/
We Are The News | QResearch Board Search | QMAP Qanon Drops

File: ced0daf2042ad53⋯.png (434.42 KB,735x678,245:226,steganography.png)

f04ce8 No.3264 [View All]

Using Steganography to reveal code embedded in Q pics & vids

Steganography is the art of hiding messages within other messages or data. Most commonly we see this utilized with pictures. This is probably encryption at its finest.

Mostly because it doesn't look like usual garbled text that we are used to seeing with encryption. The changes made by Steganography are so slight the human eye cannot perceive them.

also data can be hidden in audio files and video files

78 postsand32 image repliesomitted. Click reply to view. ____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

d6258f No.3368

>>3361

pixelknot

Q1715

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3369

>>3368

or do you think that was misdirection from Q ?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3370

File: 169e099022c5f73⋯.jpg (232.02 KB,500x470,50:47,freedom_hall.jpg)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3371

>>3370

Its Franklin and Washington in front of Independence Hall.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3372

File: 2d8c8e37cdd43da⋯.jpg (286.95 KB,800x1067,800:1067,800px-Independence_Hall_Cl….jpg)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3373

>>3369

>or do you think that was misdirection from Q ?

I don't know

>>3337

> IF Q did encode messages in the graphics, will they be useful? or decoys? or some combination of both?

I didn't have much luck with pixelKnot

I'm platform limited, the only android machine I have is ancient (lollipop 5.1.1)

I could try installing android in a VM and then trying it again.

currently exploring ghiro

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

0e8627 No.3374

>>3365

Did you watch this?

>>3324

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3375

>>3374

I've watched part of it

it seems to be the intimate dissection of a png file, exploring the multiple hiding places within it

It seems there are many, many ways of hiding data in a graphics file. If you do not know the method used, it is almost impossible to determine if any message is hidden or not.

So… is the current thinking to try all known methods, one at a time on each graphic file under question?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

aae2ba No.3376

>>3375

My current thinking is that there are at least two methods.

1) The original images that Q drops with black headers and footers have zip files embedded. The black provides ample room to hide the data.

2) The other drops - without black - might have layers that can be detected using some of the first methods described in that video.

IMAGE SIZE is important. The black-bordered images that Q uses are generally very large, much larger than is necessary to convey a photo to this board.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3377

>>3376

>much larger than is necessary to convey a photo to this board.

on this we very much agree

>The original images that Q drops with black headers and footers have zip files embedded.

from my understanding the files do not have to be zipped, it can be plain text / cypher text. in the video you reference >>3324 the 'flags' are in various forms & places

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3378

File: db88d48719e9d7e⋯.jpg (143.88 KB,842x1036,421:518,QpostedList.jpg)

>>3277

>>3376

I've loaded some of the graphics from

https://postimg.cc/gallery/29wdmgyze/

with the black top & bottom border

>pic related it's the list

I've run them thru ghiro (an automated detection app)

I'll post anything I find

if there are graphics you'd like to add to this list, please let me know

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

dd0485 No.3379

File: 9eeb18135e7aca9⋯.png (1.13 MB,980x940,49:47,trump maga pepe.png)

>>3378

Thanks. I've got them all, too, with their original names. I kind of think that might be important.

Anyway, my apologies anons. Day late and dollar short. IRL is kicking my ass, but hope to experiment more tomorrow with embedding zip into a black bar image like those we've been given. Still think our best instruction might come from doing it ourselves.

Godspeed, y'all. May sleep find your way.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1f76ba No.3380

File: 9d3156b78732754⋯.png (232.49 KB,289x613,289:613,finished.png)

Can you find the text zipped into this png image?

Created on a mac, but it shouldn't be specific. If you can handle png and zip files it should be there.

>>3306 Will go in and see if PK and zip are in there.

>>3276 Hexeditor anon - give it a try?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3381

File: e445b263f521ad7⋯.png (233.1 KB,289x613,289:613,finished2.png)

>>3380

>Can you find the text zipped into this png image?

yes

when I tried to look at it on my XP system I could tell your message was encoded on a Mac

my linux system decodes it fine

I've added a file

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3382

>>3381

Sadly, anon is allergic to corn. And cold. Kek.

Ok, so you weren't able to get to the text.

I did, however read your addition beautifully.

Well, we got this far. I guess I'll think on it again.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3384

File: 8b2f32308713858⋯.pdf (1.1 KB,Edit7.pdf)

>>3382

>>3381

I was able to read it

the text encoding didn't set well with XP

but works fine with linux

this is edit.zip that I've renamed edit7.pdf

download & rename… enjoy

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3385

>>3384

won't load.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3386

So now that we have a method - do we start going through the drops that are png and large with black at top and bottom?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3387

File: b9df8e5eb4d3644⋯.png (1.43 MB,591x1280,591:1280,Alaska-Vols-G7-SING.png)

>>3386

Tried my method with this image. Nothing.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3388

>>3385

I just tried downloading it & renaming it edit7.zip

worked fine

>>3386

(a method?) there is a color shift method discussed above

adding a zip file to a png is only one of several methods, it's a simple one like the color shift can be done without steganography software

I've loaded several of the files into ghiro

>>3378

I'll dig into the results (some of the files show interesting oddities) and share which files might be worth looking at

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

4c3b00 No.3389

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3390

>>3389

my point was that there are many methods besides the hidden zip file at the end of a PNG

in the video >>3324 seven (7) different areas where data can be hidden inside a PNG file without using a zip file

the color shift technique as demonstrated

>>3366

>>3328 (another demonstration and short explanation)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5dc2f8 No.3391

I see this isn't getting much attention. Crap.

Guess I'll keep going at it alone.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3392

>>3391

you aren't alone

I'm still chugging away with the ghiro results. some of the graphics do have anomalies I'll upload a list in a day or so

IRL calls, and I must answer

this thread will be here

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3393

File: 095639b84fd114a⋯.jpg (3.18 KB,220x152,55:38,Sys_conf_spec_y.jpg)

New Q image. I suggest looking here.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3394

>>3393

Photo is 3kb .. so not much room to hide anything.

Original photo has been located and possible links discussed.

https://voat.co/v/QRV/3009700

https://www.dvidshub.net/image/1565208/airstrikes-syria

Hopefully this may help you guys figure out where best to start searching.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3395

File: 76f8b2cb811dd81⋯.jpg (77.58 KB,1000x691,1000:691,1000w_q95.jpg)

File: 4ab4bf8b055782f⋯.png (811.32 KB,1076x745,1076:745,WitMLHA.png)

File: 8bbfe0b49e8fcf4⋯.png (454.19 KB,1590x754,795:377,Screenshot_2019-02-01 2,22….png)

>>3394

there are many earlier versions

and yes, you are correct the size of the JPG file makes it very hard to hide anything.

the string that was found (hex address 00068) may or may not be meaningful

I've been going thru the palette to see if the color method has been used to hide text, so far no luck

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

9c4c0c No.3397

File: 5760095770a44be⋯.png (260.56 KB,499x499,1:1,aarrrgh pepe.png)

>>3393

I did try to unzip it with the method I used earlier. No luck.

Come on Q. You know we are trying.

So atypical. Tiny file size. jpg instead of png. But, all of that black at the bottom is typically a good place to hide something.

Frustrated and STUCK. Which sucks. Arrrrgh.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

9c4c0c No.3398

File: 7900a81921df207⋯.png (140.21 KB,685x168,685:168,Screen Shot 2019-02-02 at ….png)

File: f33b9900612603e⋯.png (206.55 KB,693x467,693:467,Screen Shot 2019-02-02 at ….png)

>>3393

Super noisy around the planes. Increased sharpness.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3399

>>3397

Keep trying … I know I have felt that way a 1000 times with tweet decodes .. which then leads to questioning yourself.

It may be that in this case the picture was an identifier .. designed to lead people somewhere .. rather than a carrier packet. Just a thought.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3400

>>3398

the originally posted image

>>>/qresearch/4989823 is the one you want to look at

the

>noisy around the planes

is due to compression from the original (oldest on the interwebz) image according to Tin Eye was from r/MilitaryPorn/ at reddit and is significantly larger at 811KB seen

>>3395

IF Q hid anything in the image it's in the smaller one Q posted and not the earlier ones

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

f04ce8 No.4048

File: 292fba7f8333c13⋯.png (23.86 KB,1280x674,640:337,Freedom_Justice_.png)

a new Q posted graphic to investigate

>>>/patriotsfight/468

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

087967 No.4115

>>4048

Yes it is. And there was some done on it, but the anon who claimed to have the most content refused to explain how the content was derived.

Sigh.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.4116

>>4115

when they can't explain it, they don't really have anything.

the one interesting thing I'll share from the most recent Q graphic

this pic >>4048

has 260 unique colors

they might all be used for shading… or maybe one of them is used to hide text as in the example

>>3328

>>3331

IF a code anon could make a script that would

1. count and identify the unique colors in a graphic then

2. swap each unique color with a high contrast color one at a time

3. run an OCR (optical character recognition) program on the modified graphic and make note if characters are identified

4. if characters are identified note which unique color

5. swap color back and try the next unique color on the list.

A human could then take this short list of unique colors that are used in characters and read the message(s)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

fe1a10 No.5646

another tool for the arsenal

https://www.incoherency.co.uk/image-steganography/#unhide via DarkPoint

>>>/qrb/37786

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.9704

>>5646

bump

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

94de5f No.10807

Posted this in /qresearch/ and got directed here. I was looking at the 2 flags in Q posts 3908 and 3983.

Same dimensions, and imagemagick even reports the same visual "signature" hash for the images, but they have different file sizes and checksums.

What I found was interesting was the SHA256 hash of the most recent image (3983) is the filename of the image in 3908:

sha256sum AMERICA.png

f768deaef22da979abcfb73c9175b54d71fcf891666c5449c1969c07c3cc8920 AMERICA.png

Post 3908 filename: f768deaef22da979abcfb73c9175b54d71fcf891666c5449c1969c07c3cc8920.png

My theory is that the key to decrypt an image is contained in a previous image. But I'm not sure how to take this further.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.10808

>>10807

please post the actual files here

>My theory is that the key to decrypt an image is contained in a previous image.

when you have an "original unmodified file" and a "modified file" it makes it much easier to find the changes

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5744af No.11574

Anon is correct we they say the file name for the earlier flag is a sha256 hash however. America does not hash in sha256 to the same file name as the earlier flag. From what I can find out so far sha256 is a one way hash. So when you "decrypt" these hashes on the random websites that do that all they are doing is checking it against their database of collected hashes and checking if they have a match. So one possible method would be to build our own database of likely Q related words converted to sha256 and this would give us the name of the earlier flag picture. These file names could be passwords for pixelknot. Also I did note that file names from original Q posts are different than the file names from q.map.pub but that's to be expected no comms outside these boards right.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

6fe4e3 No.11665

File: 9082b610331834e⋯.jpg (498.25 KB,1500x1500,1:1,EVLtyQ1UMAA0Zhb.jpg)

File: c870a8ceb7d8fa9⋯.jpg (399.41 KB,1500x1500,1:1,Justice.jpg)

File: 11d4b4d84cf0fcb⋯.png (333.96 KB,1500x1500,1:1,Hunters_2_10_20_and_4_10_2….png)

I am new to Steg, Programming/Database background. Long time Q follower.

I am suspicious of the two "Hunters" posters from 2-10-20 and 4-09-20. They are the same canvas size (1500x1500) 8 bit gamma, but they are different physical file sizes. The pictures are slightly different quality.

WHY ?

Q doesnt do things like that without a reason. I am currently working with Stegcracker and looping through the Q image filenames as a password list. next list Stringers.

I need all the help I can get. Building the image filename list is time consuming and I have found no complete list of Q's image filenames, only partial.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.11674

File: 9d89560fb184302⋯.png (91.03 KB,609x901,609:901,CardanSteganography.png)

File: 2227ee1ad03b985⋯.pdf (829.7 KB,PictureCodeCardanGrill1803….pdf)

as posted

>>>/qresearch/8973193

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

cb4445 No.11680

YouTube embed. Click thumbnail to play.

Thought this was interdasting r.e. the flag pics do any of the ideas in here correspond to steg data etc.?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

6fe4e3 No.11711

File: 6dfaf6a744ae31e⋯.jpg (293.03 KB,1200x900,4:3,6dfaf6a744ae31edf73f3bb5ca….jpg)

File: 0546986d6c87a3f⋯.jpg (17.89 KB,255x191,255:191,6dfaf6a744ae31edf73f3bb5ca….jpg)

The flag photos posted by Q recently have the same filename, but different canvas sizes and physical disk sizes. in my uploads, the one filename has a "-2" appended.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

2ad1ee No.11727

File: 1ef1e3b6afa248a⋯.jpg (100.32 KB,784x295,784:295,Steeple_3988.jpg)

File: df0b7ae15ccec03⋯.png (94.88 KB,640x640,1:1,ExifTool.png)

File: 3c4c570dbebe381⋯.png (29.72 KB,417x502,417:502,847.png)

I ran the ExifTool on the Steeple from #3988 and found the author shows "events847".

Post #847 says "Watch the Water"

I found the original Steeple pic here, and running it through the ExifTool shows the same metadata. Still, there are no coincidences:

https://oldnorth.com/wp-content/uploads/2016/09/lclitlantern.jpg

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

c2987a No.13401

>>3266

check out StegoAppDB.

This is a HUUUUGE database of stego & original cover images used to train algorithms to identify steganography.

There are many machine learning stego projects up on github. Clone one of those bitches, import your clean set and your steg set for training… then go grab a bunch of "suspect images" from whatever board you want, and run them against your newly trained algo.

The one I suggest trying is PixelKnot. PixelKnot is an Android app that uses the F5 algorithm to do its thing. There is well over 300gb of PixelKnot pictures to play with on StegoAppDB, free to use & download.

You can obviously create your own sets as well by scripting tools, but this is an easy way to get started with KNOWN images.

#HappyHunting

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f5ea92 No.13457

>>11727

Wouldn't that go back to "Two if by sea"?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f5ea92 No.13458

>>13401

So someone with an Android device should get busy. #offthehook

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.13487

File: cbf6dc4acc602f6⋯.png (47.53 KB,849x289,849:289,pdfToolz.png)

as posted

>>>/qresearch/9122180

>>>/qresearch/9121987

https://blackarch.org/tools.html

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

25e970 No.13545

>>13457

Yep, that was my thought.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f5ea92 No.14198

YouTube embed. Click thumbnail to play.

Working with the Easton flag. There's a small row at the top. Using the stego video to get started.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
[]
[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]