[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]

/comms/ - COMMS

anons talking with anons to anons about anons anonymously
Name
Email
Subject
REC
STOP
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webp,webm, mp4, mov, pdf
Max filesize is16 MB.
Max image dimensions are15000 x15000.
You may upload5 per post.


Index | Catalog | /qresearch/ | /projectdcomms/
We Are The News | QResearch Board Search | QMAP Qanon Drops

File: ced0daf2042ad53⋯.png (434.42 KB,735x678,245:226,steganography.png)

f04ce8 No.3264 [Last50 Posts]

Using Steganography to reveal code embedded in Q pics & vids

Steganography is the art of hiding messages within other messages or data. Most commonly we see this utilized with pictures. This is probably encryption at its finest.

Mostly because it doesn't look like usual garbled text that we are used to seeing with encryption. The changes made by Steganography are so slight the human eye cannot perceive them.

also data can be hidden in audio files and video files

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

1b6cbb No.3265

>>3264

Let’s get started

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d5a995 No.3266

Who has a starter pack of images of interest and known techniques to look for?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f2f0cf No.3267

Good luck guys

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3268

>>3264

>>3266

I came over from /qreseaech/, got the subject rolling in a few breads now. Saw an anon post these:

https://8ch.net/qresearch/res/4837362.html#4837427

https://8ch.net/qresearch/res/4837362.html#4837484

Now I am here. Good for analysis, connecting dots, organization.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3269

>>3267

It’s going to take a consistent and persistent effort. Lots of ground to cover and data to gather.

Timestamps, brackets, spaces, etc.

All posts, videos, and images will need to undergo analysis. Best bet to is to just do one at a time together, starting from the beginning. At least until we get more people together. I’m in it for the long haul though. Looking forward to working with you.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3270

>>3269

>It’s going to take a consistent and persistent effort

I'll be watching and helping where I can

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3271

If the anon who posted the images can step forward, would be interested if you have the raw images. Kind of hard to see in the ones provided. Has anyone tried messing with Flynn’s new banner twat update yet?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3272

File: 60104349161e857⋯.png (291.55 KB,1755x713,1755:713,B6115935-83FE-4CD7-A027-06….png)

Apparently the method they used was putting Qs pics into a zip folder then selecting edit on the file. This is what came up. This is something else to be considered on top of everything else.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3273

File: 0f5a16c3d7dc3fb⋯.png (230.22 KB,1792x569,1792:569,3043CFA9-938B-4DF5-844A-A5….png)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3274

>>3272

>Apparently the method they used was putting Qs pics into a zip folder then selecting edit on the file

not what I would consider as a viable method of detecting an embedded message

I know a tiny bit about steganography

I've always liked crypto

I'll look to see what tools I have accumulated that are still usuable

one from long ago (XP days) is called

binaryTextScan and does what it says

scans a file for text strings (you get to set parameters such as minimum length and character set limits etc…)

I remember looking into pixelKnot a bit, but as it's an android only program as of now I didn't do much with it

I've seen some others

openPuff

stegDetect

VSL

I'd suggest we gather a set of links to tools for the purpose of detecting and decoding messages hidden in files

https://www.geekdashboard.com/best-steganography-tools/

http://www.jjtc.com/Steganography/tools.html

http://stegano.net/tools

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

1b6cbb No.3275

Post at will. This thread was listed in Global Notables on /qresearch/

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

df65cb No.3276

I'd like to help out if I can but I'm very much a novice at this sort of thing. On the other hand I can find my way around a hex editor and would be willing to work at prying apart image files. At a minimum I could try to help gather up best practices and tools from what people post.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

aae2ba No.3277

File: 0f5a16c3d7dc3fb⋯.png (230.22 KB,1792x569,1792:569,stego nightmare.png)

File: f60e66aa80a0ded⋯.png (1.27 MB,591x1280,591:1280,06.12.2018_13.08.57a_Alask….png)

>>3266

I think I have every Q image in original compression.

The thing is - they read one size, and then a different when downloaded.

Anyone know 8ch well enough to understand that phenomenon?

Also, will commit to this location for a week, avoiding the distractions of the main board as much as possible.

ANON NEEDS HELP

Working with an above average IQ and 20 years of photo experience including website design and various compressions, but still in over my head.

Here's the original image - in my best knowledge - for the file discovered by helper anon.

06.12.2018 13.08.57 alaska vols sing

This was the G7 trip where the missile was launched, remember? I'd presume the other file info is the time stamp.

It's going to be a bear to get you up to my speed, but stick with me. Will be glad to carefully convey my trials and errors. Have tried to document them well in my files over the months. Will confess that anon is not working on the best machine for this work. Alternate work in another location, but can't get to it for a while. Hopefully, we'll duplicate that work well enough to make it of no consequence.

First concern: some of these results might be computer/platform/compression algorithm specific. We need to find it, and then we need to duplicate it.

Next concern: this work has been shilled so heavily over the months - even to the point of being removed by a bad BV back in the day - that there will be holes in being able to duplicate some of it. But I bet we can. And we are hopefully oldfag enough to ignore the shills.

>>3276 Believe it or not, anon, this is my weakness. So glad to have you here.

(And crazy to be using such low post numbers!)

We can do this.

Anon is available, available, available, but is fond of sleep. (Currently well rested. Needed that nap.)

Go time.

Ready?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

aae2ba No.3278

>>3276

So HexAnon:

Compress the image from 3277 in a zip

Open that zip in your favorite text editor

Search for the words "zip"

Open compressed data in hex editor

Copy the ZIP components

(This is where anon got lost.

Between the words? Zip at the end. Have no idea what Hex looks like. Raised geeks, but never properly converted myself.)

Copy the data re: zip

Try to read it? Decompress it? Edit that string again? This is where help is required.

It seems that was where helper anon was leading us. Did not convey zip program, etc., but something was able to read through the compressed and embedded data.

(Also suspect that kids to raise routine was a cover.)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3279

>>3277

Shills are easy to filter. Let’s do this

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

aae2ba No.3280

Billed as full-sized images.

A resource:

https://postimg.cc/gallery/29wdmgyze/

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3281

>>3277

>Anyone know 8ch well enough to understand that phenomenon?

yes it has to do with the method of calculating the size

1kb = 1000 bytes or 1024 etc…

>Anon needs help

try reading the wiki page

https://en.wikipedia.org/wiki/Steganography_tools

https://en.wikipedia.org/wiki/Steganography

I'll try to answer any questions that I can

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

da7097 No.3282

File: ac2592f1279c253⋯.png (28.18 KB,854x387,854:387,Steganography-Tools-in-Kal….png)

Steganography Made Easy in Linux 11 June 2016

Now it is time for our recipient to open this file. After they open this jpg in SteGUI they simply go to the Actions tab and select “extract”. Another pop-up box will appear to input the necessary files. The input file at the top will simply be the jpg that we have sent them. The output file will be a new file we can name anything. Here I've just made it a file called out.txt. Now that we have our information in a text file we can easily open it for display.

https://linuxconfig.org/steganography-made-easy-in-linux

pic of another tut, couldn't copy and paste.

https://www.yeahhub.com/use-steghide-stegosuite-steganography-tools-kali-linux/

Learning how to create an image which contains additional content will help to learn how to extract content. Those who hide information in files using steganography usually do so with the intention that the information will be retrieved by the recipient.

If encryption is employed as an additional layer of security it will limit who can extract valid data.

For Windows users, if you have more than 3 or 4 gigs of ram, you could get linux running in Virtual Box. There are many ready made images of distros, like lemnux, a forensic discovery linux distro. Because it is a prebuilt image there is no need to install the OS. There are several security suites available as prebuilt images. Many are made for VMWare. VMWare runs on Windows, they used to offer a free version called VMWare Player, in which you can run prebuilt images. VirtualBox can run the VMWare format images also.

Running multiflavors OS will allow you to access all potential tools. Sometimes there are OS centric tools with no comparable alternative for the other OS platform.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3283

Have played with a lot of steganography detection, etc., but this video took me the furthest.

https://youtu.be/KUZVIBXfoeA

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3284

>>3282

>Learning how to create an image which contains additional content will help to learn how to extract content.

Yep. Already came to that conclusion.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3285

>>3281

Ah! That clicked immediately. Thanks.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

8eb0c6 No.3286

Been waiting for this board to happen since the very start!

If we get any data of real value

I believe it will come from this and nothing else,

Good luck, it will be hard and lonely.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5ebd58 No.3287

does qmap.pub pull raw files from Q posts?

https://media.8ch.net/file_store/a7ffb193423f0a5573ceeefe7c2a7863d1fc6d1559e28d93af78f63e36cdceed.png

I cant replicate the original results from freedom.png

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3289

File: a7ffb193423f0a5⋯.png (2.65 KB,310x163,310:163,UNITED_WE_STAND.png)

File: 2f5f3f1584ef1c9⋯.png (2.53 KB,310x163,310:163,Freedom_.png)

File: c087946aa2580e7⋯.png (254.05 KB,1292x1358,646:679,FREEDOMFLAG.png)

File: 6cf56cf3c6b2348⋯.png (158.15 KB,901x443,901:443,Screen Shot 2019-01-20 at ….png)

File: 1d9296b859154c9⋯.png (174.54 KB,945x386,945:386,Screen Shot 2019-01-20 at ….png)

Reposting the first round - the flag.

Remember when it was first posted and their were the dots everyone chased? The code and bars - from what I can tell - came from layers pulled out of the image on another board.

So, this is where the image came through in layers, not zip files.

Means there's likely more than one technique at play.

Also, anon has begged and begged for help and missed a Q & A where anon would ask about steganography, so said so in a link.

Q posted pixelknot not long after that. But somehow I understood that pixelknot (as far as the software) wasn't going to be the answer.

While I've played with passwords off and on, kind of abandoned them after a while. Might need to reconsider.

Two images from bread #3316 as posted earlier. From private archive.

https://8ch.net/qresearch/res/2627000.html#2627687

Has missing images.

Will dig into it deeper in a minute.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

0277fd No.3290

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

0277fd No.3291

https://postimg.cc/gallery/29wdmgyze/

Archive off all Q images in full rez

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3292

File: e7fc84f43db2e98⋯.png (56.38 KB,720x202,360:101,Screen Shot 2019-01-20 at ….png)

File: 4f48ae6ec59ea88⋯.png (56.71 KB,571x389,571:389,Screen Shot 2019-01-20 at ….png)

>>3289

Link in image

archive.4plebs.org/pol/thread/149158110

Eventually a good discussion in this thread: http://archive.4plebs.org/pol/thread/149183142/#149183683

(FFS. AFLB is there!)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3293

>>3287

>does qmap.pub pull raw files from Q posts?

good question, and a crucial one to our task here

>>3289

>Reposting the first round - the flag.

do you have the original file for 'FreedomFlag' ?

the original file is crucial to finding anything as far as I know

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3294

>>3291

Thanks! Posted also a few above you in

>3280

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3295

>>3293 (we crossed paths)

>archive.4plebs.org/pol/thread/149158110

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3296

READ before posting. READ IN TREE VIEW before posting.

Can't afford to waste our efforts.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

df65cb No.3297

>>3276

I've worked in software, written machine code, so hex is no biggie, now that the family isn't pestering me nonstop I can take a look. Thanks.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3298

The flag seems to have come from deriving layers in a photo imaging program, not by code.

Different techniques at play.

I have examples of near hits on the Podesta photo with the fish and number using text edit

and

a couple of layered images embedded in the photos of the garbage truck that was used to ram the train with congressional family members on it.

Will dribble those out, but not right now.

(Can't even begin to process what a year has taught me. That train crash seems like a lifetime ago, but less than a year.)

Oh, and then there's the refrigerated truck drops from Asia where /someone/ and I had a great chat in the middle of the night about "staring at those photos forever or finding out what's in them given their size."

This is real. We have to finish it.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3299

>>3290

Alaska Vols Returned this gibberish. Anyone?

===

Û¡–Èd3I$²Hd–É&ÒË$’K-’™$’Óm6É-’_MšI%²Ù$’[$ÒÛm6[-šÛ-¦S’Ùi K%É šI¶Ël–Ûi²I 6Ó 2“

„@D‚Oí2BM¦S!ºHI¤Úm¶“m²M’[I¤Ù$–Ù’BI²où’Ûd’[m´Ë-ÒKm’m°I –“IÙ$’H$·ó­$É-¤™ $ 0m’Ø@M°’`I:ÛM’Ûm”Ù%&Úa'ÿm¦’m´ëi6ÙM¤©¤Ýý¶ÚM¦Ûm¤ŠM¼Ûm6Ûø£icLÏa9‚ù

BãQè[õö5׆WF—âúH]öÖdt͂èq†—/9¯@H‚hö½_ €ÔH¿TWì³Ù.Š}`÷…µsV*óë~!‰Ú˜q¯S–½õ›ì́`aA`ñf¹Tã/ô‚>I×kEô»#Odû¾$óè¹Q%ú¼Á:95C$âÕ"Ø·Ÿ­htJ½Ñ‹îŸ]ËïV¤¬[N4Û

m¼Å½nuðY-dg76ž”8›Ù$ó´§ñ©à¶°Éœ•±‰Ѭ-‰)ËxoÎýùutìgv\(Œû.£16Þõa0

.Ñ%Lc"U!pÁþ=Ælø†ø=¸?­–’ŒX ð)sfÿÁ[?Ô,å¯a玃˜–3I®œ‰ßúº­u¦ä\‰öáÞwg€;T!Vq–týZîÏyÃ.nC©ÆeŸD<ý/ÈȖMŒ ¹»õFÉÜvW`Ð?46Qý|[’ ¶Ž ™<º¤©QLíU¨Œã¢ü8èî¼´7K‰ØLµt³èɃÁ¤Ž

Fh>r*šÚ!cz÷,êøÿ±(Q¢Ÿp%òôΩs.P“-å8½€Iîélۀ¿¯c 9ì“I1µ´»aã »XðåM§ö”IÏ°^60ÎǧÃùÀ]O~Oà?ï3ö¡/ѸµPégó‡÷[+Aÿ‘°ðø& HÊÐ0 ‘ÁIï_({"Üp½¨n©´c̝ÁAd|ÍFWx÷þ=|FÀ•º3ÞqóÌŨÐ}ËðN=!Î;bh¹Ø.|Æ9Ž,>çÉÃdYçm½

Ãî2¾}hcq˜Çß+€f¶óÍêFËD†S™ö5ób‰µß,mrÒñC¶ë[Ešµ¶ {#ÃówÈ)?c:Øtô­)U‰'£Øãf…d!øN*,ÔæïüÀ{¬=ÿhû·ƒY\Kí>ñ²Î%Ëñdp d6ߢßϞj–›

øßó'†Á.™ –R 8”¹ØL§!†¼ùÓ~ü†b¨œ–ãR48š+„ˆÁ¿±ÙïçÚì/b¢«+Ú/£Îl²oÜ

Ëï@5H{F«¢ ð=?¼URó`M oÜ2ˆ/|=ò`E²ZÒ¡câÒ½™¡³ÑÃÞüË÷ߚC1ú9Z»Ks)¿S¨9߀àTÎVãCÛêJ};¶0BٝÁ\ÆâÈ@ÊE¸;4µÜpQz¤pcs^JaÀ÷ÿåšvŸ¹áE¾€P¢+ÉÐÙ

n‡!…

­====

Partial. Too long.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3300

>>3291

thanQ that will be very helpful

>>3295

>archive.4plebs.org/pol/thread/149158110

it's possible, I don't immediately recognize that thread (from Sun 12 Nov 2017) do you have a particular post in mind from that thread? I don't really have the time to search thru it

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae9398 No.3301

>>3300

It's a Q post there, anon.

http://archive.4plebs.org/pol/thread/149158110/#q149160361

Anything else I can do? Coffee? Tea?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3302

File: 246b443391a1111⋯.png (155.88 KB,1590x716,795:358,Screenshot_2019-01-20 pol….png)

>>3301

ah… OK I understand

by that the original filesize is 3Kb far too small to hold much but who knows?

I'm finding that the different steg software is quite specific about file types

when looking to decode

.png

.jpeg

seem to be most common as outputs for the encoding programs

anybody know what pixelKnot's outputs are ?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

0277fd No.3303

>>3299

>FËD

>Ëñd

only thing I saw. Several ways (other than steg) to hide info - been decades since I played with this stuff (on dialup)…

might have a marker before data (think like a comma in a csv)

might be in a grid

might be every so many characters every so often

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

0277fd No.3304

>>3299

maybe also search for keywords/shorthand names like HRC NN etc

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

df65cb No.3305

>>3278

I don't think you have to compress it before opening it. I opened it in a hex editor (plenty online for free) and could search the data for the word 'zip' in there. It only shows up once as far as I can tell. If it is some kind of bookmark or flag for zip data then you'd need to figure out the extents of it. Where does it stop and start?

I'm going to do a little bit of learning on zip file structure to see if I can get some other clues. Sadly I never had much training in forensics. That isn't to say I don't find the stuff rather interesting.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

df65cb No.3306

>>3305

I tend to be a skeptic in that I will take something like this and think, well you know the 'zip' showing up in all that junk _could_ just be stupid random happenstance. What if it isn't even intentional? (But we know there are no coincidences).

SO I had noticed upon looking at a zipped txt file with just one word in it that the zip file had the letters PK showing up in it (beginning and end) and I thought that was interesting.

If you read up on zip file structure (thanks wikipedia):

Most of the signatures end with the short integer 0x4b50, which is stored in little-endian ordering. Viewed as an ASCII string this reads "PK", the initials of the inventor Phil Katz. Thus, when a ZIP file is viewed in a text editor the first two bytes of the file are usually "PK". (DOS, OS/2 and Windows self-extracting ZIPs have an EXE before the ZIP so start with "MZ"; self-extracting ZIPs for other operating systems may similarly be preceded by executable code for extracting the archive's content on that platform.)

So applying that to the original image from 3277

>>3277

If you open it in a hex editor you can absolutely find PKs in there. If that encourages anyone at all… I think that that it is further evidence that there is a zip file hidden in the image. I will pry at this some more and see if I can tease it out but this is my first time trying anything like this.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3307

File: 4734918128eca76⋯.png (140.01 KB,1590x899,1590:899,How to Hide or Unhide ZIP ….png)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3308

They took down the Notable from qresearch, hopefully we got enough man power in the meantime. I tried reaching out to another stenographer I ran with during 41818. Encourage others to reunite their teams as well if they had any.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3309

>>3308

>They took down the Notable from qresearch,

not much of a surprise

>hopefully we got enough man power in the meantime. I tried reaching out to another stenographer I ran with during 41818. Encourage others to reunite their teams as well if they had any.

sounds good anon

experienced help would be greatly appreciated

some of the anons here mean well, but are a bit short of actually understanding the mechanics of what we are doing

I'll keep this thread alive for a few months minimum and see if we get any results

I'll also fire up a few of the steg programs to see what works and what doesn't (some of 'em are OLD!) and provide some examples to help bring people up to speed

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

df65cb No.3310

>>3307

If there is actually a zip file in there, I don't think it was cobbled together with this method. I tried opening it in 7-zip earlier and it didn't find an archive. There are a few tutorials like this online and it is a clever way to combine images with files but I don't think it applies here.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3311

File: 4865e03e1cf941e⋯.png (23.15 KB,355x560,71:112,zipFileStructure.png)

>>3310

> but I don't think it applies here.

I tend to disagree

If you wish to detect these embedded files you first find a method of encoding and see if that method was used.

If you want to cast off blindly then I'd strongly suggest you investigate the parameters of zip files

header

file descriptor

end of record marker

when you find all three then and only then can be sure there is a zip file embedded in the data between the header and the EOCD (Not to be confused with EOF)

https://en.wikipedia.org/wiki/Zip_(file_format)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

df65cb No.3312

>>3311

I've been studying the file in a hex editor and while I did initially find PK in there and the text string 'zip' easily enough, there is no Central directory file header signature = 0x02014b50

The central directory is a crucial part of the zip file. If there is none, then there can't be a zip file archive.

Since there is no obvious central directory file header signature, I went back to looking at the PNG file format to see if there were any other clues in there.

I was not discounting it just because I couldn't open it in 7zip. I was discounting the method because the author said that using that method it ought to be openable in 7zip (which makes sense based on a number of things). I also discounted it because of the other observations I had made.

Note: there is only one instance of 'zip' and one instance of 'PK' (all caps and case is important) in the file.

You can make these observations on your own with a hex editor just by doing searches for the relevent lines.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

df65cb No.3313

I also did go back and look at

>>4837427

What he did is NOT stenography. It looks to me like he was looking at hex code and trying to imagine words out of it. He was including the standard PNG tags like IHDR and IDAT in his supposed coded message. This is not legit. I have not studied forensics but I have done programmed computers professionally and I am sure based on things that I do have experience with that this was not a sensible way to analyze a hex file.

and before someone else pounces on me for it, I did not find the header for a pkzip central directory file header in there either… this would be 504b0102

The test file I created to verify my methods did include a pkzip header in it and I was able to find it effectively with my method.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1b6cbb No.3314

>>3313

Yep definitely not stenography. And if nothing came of the flag either then it’s back to the drawing board.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

df65cb No.3319

>>3314

Not Steganography either heheh

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ffb64b No.3320

File: 8f4d180dffdb1b3⋯.jpg (142.64 KB,500x470,50:47,freedom hall.jpg)

File: 28077a5d61c6818⋯.jpg (85.09 KB,533x712,533:712,train crash 1.jpg)

File: 1a103aab8938fbf⋯.png (1.15 MB,1000x667,1000:667,train crash 2.png)

>>3309

I guess we need to pop an image up now and then to keep interest high. I don't think a couple of hours are enough to grab moar brain power.

From what I'm reading in this thread, not even close. Lots of helpful suggestions but very little knowledge. Frustrating.

Adding an image that has, according to the place I grabbed it, been decoded, but did not come with the decode. Or maybe it's that one of the train crash images came from the red/blue meme? When that meme is small in the preview, you can see layers behind it.

AGAIN IT APPEARS THIS NEW MEME HAS SOMETHING IN IT, BUT THE TECHNIQUE IS ANOTHER IMAGE LAYER AND NOT A ZIP FILE.

Will spend the day going through archives to see what's been missed with regard to possible techniques.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3321

File: 7a5c8196b458ba6⋯.pdf (406.32 KB,TacklingAndroidStegoAppsIn….pdf)

File: 7e24f78966113b1⋯.png (375.75 KB,1600x754,800:377,Screenshot_2019-01-21 1808….png)

Tackling Android Stego Apps in the Wild

https://arxiv.org/pdf/1808.00430.pdf

according to this

>As shown in the “Output Format” column, 2 of the 7

>apps produce stego images in JPEG format while the other

>5 produce PNGs. The two types of output format indicate

>different embedding domains: frequency domain embedding

>for JPEG and spatial domain embedding for PNG.

so… if it's done on an android platform the output format is either JPEG or PNG

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

f04ce8 No.3322

>>3320

> I don't think a couple of hours are enough to grab moar brain power.

I agree

I will attempt to educate those who browse here in an attempt to grow 'moar brain power'

some step-by-step instruction & examples of how to use some of these software packages to hide data in images may help people learn the techniques necessary for detecting and decoding any 'found in the wild'

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ffb64b No.3323

File: 63a62f867348ab8⋯.png (23.21 KB,502x130,251:65,still looking @ the same b….png)

>>3322

Here's a link I was given ages ago - about the time of the refrigerated truck drop from Aisa:

https://www.mobilefish.com/services/steganography/steganography.php

That video I posted - comms BO - can you allow video embedding? Might catch attention that way.

Will leave it to you to do the job if it's a go.

https://youtu.be/KUZVIBXfoeA

Moar tools stashed somewhere. Let me find them. Can't say they matter without a better understanding, though. Part of anon's barrier has always been the issue of preserving anonymity. Could work with a local group in person, but that seems risky.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3324

YouTube embed. Click thumbnail to play.

>>3323

>can you allow video embedding?

done

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ffb64b No.3325

>>3324

Huzzah!

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3327

File: 3d01b638675ff6c⋯.pdf (173.5 KB,BinaryTextScan.pdf)

>>3325

Warning this is NOT a PDF

This is a test to see if we can share programs here.

this program BinaryTextScan.exe is an old windows XP utility for scanning files of any type for text strings.

I've changed the extension on the file

BinaryTextScan.exe (a useful tool for the windows platform) to

BinaryTextScan.pdf

in order to see if I can upload it here.

If successful you should be able to download this file and change the extension back to .exe and have the working program

http://www.antionline.com/showthread.php?245747-Binary-Text-Scan

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

f04ce8 No.3328

File: ba7cebc5414cd11⋯.png (1.24 MB,918x470,459:235,crFzip.png)

File: ccf49ebd4b782d1⋯.png (1.24 MB,918x470,459:235,qrFlagEditedWreadible.png)

>>3327

I'm uploading two files

qrflagEditedWreadible.png - original PNG graphic

crFzip.png - final output file with zip embedded

crFzip.png also has the plain text Hello World in it

I set the color of the text to be slightly off from one of the major colors in the graphic and then placed the text in that area

I first ran into that type of stego way back in the web design days

You'd have a front page for your website that the web crawlers would read… there was the black text on the background that all humans could read and also there was text in a color so near the background color the human eye couldn't see it. This was to stuff the page with key-words for the search engine crawlers… the crawler would see ALL the text while the humans wouldn't see all the key-words and phrases the web site designer wanted the search engine to see.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ffb64b No.3329

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ffb64b No.3330

>>3328

I remember that. Trying to game Google for page ranking.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3331

File: 1044b5a0e8a392d⋯.png (189.85 KB,1501x780,1501:780,hexEditorViewcrFzip.png)

File: 7001763f71d899c⋯.png (2.25 MB,1024x768,4:3,replaceColor.png)

>>3328

uploading both the hex editor's view of the beginning and end of crFzip.png and HelloWorld.zip for comparison

and the 'color swap' technique to reveal the Hello World plain text message color embedded in a red stripe

most of the red stipe is color AB1E31 (171,30,49) so I wrote the text with font color AF1E31 (175,30,49) and it's invisible until I do a color swap

>>3330

yup that's the trick

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3332

>>3329

thanQ

looks good, I'll prolly try the toolkit as it seems to install many of the programs I've already been looking at / test driving.

one question

what is CTF ?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ffb64b No.3333

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3334

>>3333 (cheKEKed)

>Capture the Flag.

makes sense.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3335

>>3334

pixelKnot sux

can't get it to decode a test message I just encoded with it

kek

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

6e7faa No.3336

>>3335

Thanks for trying.

Do think this is how we learn: Make and decode our own. Test for techniques.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3337

>>3336

>Make and decode our own. Test for techniques.

I agree

I remember reading somewhere a myth about the origins of stegonography

Seems in Roman times it was common to use a small piece of wood (tabula) covered with wax as a notepad. You could scratch your message or notes onto the surface, then commit it to something more permanent at leisure if needed or simply melt the wax to erase and make the tablet ready for another use. These things were fairly common and the practice well known so of course the military used it for orders and correspondence. Here's where the fun starts, at some point a smart man figured out a method to get a secret message thru to it's intended recipient undetected. Simply scrape off all the wax, sand the surface a bit, write your real message in charcoal onto the bare wooden surface, then re-cover the tablet with wax scratch a cover message into the surface and have the tablet delivered.

Anyone not knowing there was a hidden message or how to extract it would assume the message seen on the surface was the totality of the tablets meaning.

I've wondered about Q's possible use of steganography. There are simple methods and complex methods of encoding, some are easy to detect and some not so easy… IF Q did encode messages in the graphics, will they be useful? or decoys? or some combination of both?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

deb4dd No.3338

File: 8f4d180dffdb1b3⋯.jpg (142.64 KB,500x470,50:47,freedom hall.jpg)

>>3337

I'm going with both, from what I've seen.

Someone work with this in photoshop to reveal a back layer?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

3e7301 No.3339

Does this cipher look familiar to anyone?

>%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz

>&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3341

File: 0057ba74454adc4⋯.png (95.44 KB,1590x754,795:377,Screenshot_2019-01-22 Steg….png)

>>3337

good forensic tools for detecting the presence of messages hidden in files is a little hard to find, so far I've tried a few different stego progs and some work, some don't and some I cannot use due to platform restrictions.

the following is a quote from the softpedia site

++++++++++++++++

In order to be able to encrypt images, users will require specialized software applications for embedding messages and extracting them.

The main advantage of this security technique is that encrypted images typically require the original application to display the message, therefore unauthorized users have little chance of decrypting pictures without the appropriate tool.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f75aa4 No.3359

Lost our mojo?

Will be around for a couple of days. Working at least one idea.

FIGHT FIGHT FIGHT.

We have to get this done.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3360

>>3359

Very interested in this also .. but need someone to show us a proof of concept ie what works.

Have tried the app suggested in the Q drops but didnt get anywhere - but have been wondering if this is why Q keeps on about needing the keystone … because it unlocks hidden information contained in the graphics.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3361

>>3360

>the app suggested in the Q drops

which Q drops

what app?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5d84af No.3362

>>3360

Today anon will set up to perform hiding a message and then decrypting it. If successful, will post here to see of others can decrypt.

But first, much coffee.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3363

File: 67e6b02520705cb⋯.png (629.79 KB,899x759,899:759,schiffMagaHatOriginal.png)

File: 8eb8457cfa24f7f⋯.png (771.96 KB,899x759,899:759,schiffMagaHat.png)

File: d31fded936c87c8⋯.png (19.89 KB,748x485,748:485,decodeSchiffMagaHat.png)

>>3362

what app will you be using to do the encoding?

see

>>3341

> typically require the original application to display the message,

I've found this to be true in my limited experience.

I'll reciprocate,

I used Open Puff v4.01

password A ~ Quiet Skies

password B ~ Flesh-Eating

password C ~ Alabama Election

under the PNG options I used the 1/4 [25%] - High encryption setting

original image ~ schiffMagaHatOriginal.png

image with encoded message ~ schiffMagaHat.png

you tell me what the message is

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5d84af No.3364

>>3363

Yes, but no.

Going with the hunch that decode is photoshop or decompression (zip) and not app specific.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3365

>>3364

>the hunch that decode is photoshop or decompression (zip) and not app specific

OK…

care to elaborate on the method of embedding the message you'll be using?

a simple bit shift on the color for the text as discussed >>3328

or are you thinking it will be an embedded photoshop layer ?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3366

File: faeb76cab0c8279⋯.jpg (44.57 KB,899x759,899:759,schiffMagaHatQ.jpg)

>>3364

try this one then

a message was embedded using the color method

look for D51629

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3368

>>3361

pixelknot

Q1715

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3369

>>3368

or do you think that was misdirection from Q ?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3370

File: 169e099022c5f73⋯.jpg (232.02 KB,500x470,50:47,freedom_hall.jpg)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3371

>>3370

Its Franklin and Washington in front of Independence Hall.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3372

File: 2d8c8e37cdd43da⋯.jpg (286.95 KB,800x1067,800:1067,800px-Independence_Hall_Cl….jpg)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3373

>>3369

>or do you think that was misdirection from Q ?

I don't know

>>3337

> IF Q did encode messages in the graphics, will they be useful? or decoys? or some combination of both?

I didn't have much luck with pixelKnot

I'm platform limited, the only android machine I have is ancient (lollipop 5.1.1)

I could try installing android in a VM and then trying it again.

currently exploring ghiro

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

0e8627 No.3374

>>3365

Did you watch this?

>>3324

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3375

>>3374

I've watched part of it

it seems to be the intimate dissection of a png file, exploring the multiple hiding places within it

It seems there are many, many ways of hiding data in a graphics file. If you do not know the method used, it is almost impossible to determine if any message is hidden or not.

So… is the current thinking to try all known methods, one at a time on each graphic file under question?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

aae2ba No.3376

>>3375

My current thinking is that there are at least two methods.

1) The original images that Q drops with black headers and footers have zip files embedded. The black provides ample room to hide the data.

2) The other drops - without black - might have layers that can be detected using some of the first methods described in that video.

IMAGE SIZE is important. The black-bordered images that Q uses are generally very large, much larger than is necessary to convey a photo to this board.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3377

>>3376

>much larger than is necessary to convey a photo to this board.

on this we very much agree

>The original images that Q drops with black headers and footers have zip files embedded.

from my understanding the files do not have to be zipped, it can be plain text / cypher text. in the video you reference >>3324 the 'flags' are in various forms & places

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3378

File: db88d48719e9d7e⋯.jpg (143.88 KB,842x1036,421:518,QpostedList.jpg)

>>3277

>>3376

I've loaded some of the graphics from

https://postimg.cc/gallery/29wdmgyze/

with the black top & bottom border

>pic related it's the list

I've run them thru ghiro (an automated detection app)

I'll post anything I find

if there are graphics you'd like to add to this list, please let me know

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

dd0485 No.3379

File: 9eeb18135e7aca9⋯.png (1.13 MB,980x940,49:47,trump maga pepe.png)

>>3378

Thanks. I've got them all, too, with their original names. I kind of think that might be important.

Anyway, my apologies anons. Day late and dollar short. IRL is kicking my ass, but hope to experiment more tomorrow with embedding zip into a black bar image like those we've been given. Still think our best instruction might come from doing it ourselves.

Godspeed, y'all. May sleep find your way.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

1f76ba No.3380

File: 9d3156b78732754⋯.png (232.49 KB,289x613,289:613,finished.png)

Can you find the text zipped into this png image?

Created on a mac, but it shouldn't be specific. If you can handle png and zip files it should be there.

>>3306 Will go in and see if PK and zip are in there.

>>3276 Hexeditor anon - give it a try?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3381

File: e445b263f521ad7⋯.png (233.1 KB,289x613,289:613,finished2.png)

>>3380

>Can you find the text zipped into this png image?

yes

when I tried to look at it on my XP system I could tell your message was encoded on a Mac

my linux system decodes it fine

I've added a file

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3382

>>3381

Sadly, anon is allergic to corn. And cold. Kek.

Ok, so you weren't able to get to the text.

I did, however read your addition beautifully.

Well, we got this far. I guess I'll think on it again.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3384

File: 8b2f32308713858⋯.pdf (1.1 KB,Edit7.pdf)

>>3382

>>3381

I was able to read it

the text encoding didn't set well with XP

but works fine with linux

this is edit.zip that I've renamed edit7.pdf

download & rename… enjoy

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3385

>>3384

won't load.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3386

So now that we have a method - do we start going through the drops that are png and large with black at top and bottom?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f81cdf No.3387

File: b9df8e5eb4d3644⋯.png (1.43 MB,591x1280,591:1280,Alaska-Vols-G7-SING.png)

>>3386

Tried my method with this image. Nothing.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3388

>>3385

I just tried downloading it & renaming it edit7.zip

worked fine

>>3386

(a method?) there is a color shift method discussed above

adding a zip file to a png is only one of several methods, it's a simple one like the color shift can be done without steganography software

I've loaded several of the files into ghiro

>>3378

I'll dig into the results (some of the files show interesting oddities) and share which files might be worth looking at

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

4c3b00 No.3389

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3390

>>3389

my point was that there are many methods besides the hidden zip file at the end of a PNG

in the video >>3324 seven (7) different areas where data can be hidden inside a PNG file without using a zip file

the color shift technique as demonstrated

>>3366

>>3328 (another demonstration and short explanation)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5dc2f8 No.3391

I see this isn't getting much attention. Crap.

Guess I'll keep going at it alone.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3392

>>3391

you aren't alone

I'm still chugging away with the ghiro results. some of the graphics do have anomalies I'll upload a list in a day or so

IRL calls, and I must answer

this thread will be here

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ca2537 No.3393

File: 095639b84fd114a⋯.jpg (3.18 KB,220x152,55:38,Sys_conf_spec_y.jpg)

New Q image. I suggest looking here.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3394

>>3393

Photo is 3kb .. so not much room to hide anything.

Original photo has been located and possible links discussed.

https://voat.co/v/QRV/3009700

https://www.dvidshub.net/image/1565208/airstrikes-syria

Hopefully this may help you guys figure out where best to start searching.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3395

File: 76f8b2cb811dd81⋯.jpg (77.58 KB,1000x691,1000:691,1000w_q95.jpg)

File: 4ab4bf8b055782f⋯.png (811.32 KB,1076x745,1076:745,WitMLHA.png)

File: 8bbfe0b49e8fcf4⋯.png (454.19 KB,1590x754,795:377,Screenshot_2019-02-01 2,22….png)

>>3394

there are many earlier versions

and yes, you are correct the size of the JPG file makes it very hard to hide anything.

the string that was found (hex address 00068) may or may not be meaningful

I've been going thru the palette to see if the color method has been used to hide text, so far no luck

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

9c4c0c No.3397

File: 5760095770a44be⋯.png (260.56 KB,499x499,1:1,aarrrgh pepe.png)

>>3393

I did try to unzip it with the method I used earlier. No luck.

Come on Q. You know we are trying.

So atypical. Tiny file size. jpg instead of png. But, all of that black at the bottom is typically a good place to hide something.

Frustrated and STUCK. Which sucks. Arrrrgh.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

9c4c0c No.3398

File: 7900a81921df207⋯.png (140.21 KB,685x168,685:168,Screen Shot 2019-02-02 at ….png)

File: f33b9900612603e⋯.png (206.55 KB,693x467,693:467,Screen Shot 2019-02-02 at ….png)

>>3393

Super noisy around the planes. Increased sharpness.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

d6258f No.3399

>>3397

Keep trying … I know I have felt that way a 1000 times with tweet decodes .. which then leads to questioning yourself.

It may be that in this case the picture was an identifier .. designed to lead people somewhere .. rather than a carrier packet. Just a thought.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.3400

>>3398

the originally posted image

>>>/qresearch/4989823 is the one you want to look at

the

>noisy around the planes

is due to compression from the original (oldest on the interwebz) image according to Tin Eye was from r/MilitaryPorn/ at reddit and is significantly larger at 811KB seen

>>3395

IF Q hid anything in the image it's in the smaller one Q posted and not the earlier ones

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.
Post last edited at

f04ce8 No.4048

File: 292fba7f8333c13⋯.png (23.86 KB,1280x674,640:337,Freedom_Justice_.png)

a new Q posted graphic to investigate

>>>/patriotsfight/468

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

087967 No.4115

>>4048

Yes it is. And there was some done on it, but the anon who claimed to have the most content refused to explain how the content was derived.

Sigh.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f04ce8 No.4116

>>4115

when they can't explain it, they don't really have anything.

the one interesting thing I'll share from the most recent Q graphic

this pic >>4048

has 260 unique colors

they might all be used for shading… or maybe one of them is used to hide text as in the example

>>3328

>>3331

IF a code anon could make a script that would

1. count and identify the unique colors in a graphic then

2. swap each unique color with a high contrast color one at a time

3. run an OCR (optical character recognition) program on the modified graphic and make note if characters are identified

4. if characters are identified note which unique color

5. swap color back and try the next unique color on the list.

A human could then take this short list of unique colors that are used in characters and read the message(s)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

fe1a10 No.5646

another tool for the arsenal

https://www.incoherency.co.uk/image-steganography/#unhide via DarkPoint

>>>/qrb/37786

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.9704

>>5646

bump

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

94de5f No.10807

Posted this in /qresearch/ and got directed here. I was looking at the 2 flags in Q posts 3908 and 3983.

Same dimensions, and imagemagick even reports the same visual "signature" hash for the images, but they have different file sizes and checksums.

What I found was interesting was the SHA256 hash of the most recent image (3983) is the filename of the image in 3908:

sha256sum AMERICA.png

f768deaef22da979abcfb73c9175b54d71fcf891666c5449c1969c07c3cc8920 AMERICA.png

Post 3908 filename: f768deaef22da979abcfb73c9175b54d71fcf891666c5449c1969c07c3cc8920.png

My theory is that the key to decrypt an image is contained in a previous image. But I'm not sure how to take this further.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.10808

>>10807

please post the actual files here

>My theory is that the key to decrypt an image is contained in a previous image.

when you have an "original unmodified file" and a "modified file" it makes it much easier to find the changes

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5744af No.11574

Anon is correct we they say the file name for the earlier flag is a sha256 hash however. America does not hash in sha256 to the same file name as the earlier flag. From what I can find out so far sha256 is a one way hash. So when you "decrypt" these hashes on the random websites that do that all they are doing is checking it against their database of collected hashes and checking if they have a match. So one possible method would be to build our own database of likely Q related words converted to sha256 and this would give us the name of the earlier flag picture. These file names could be passwords for pixelknot. Also I did note that file names from original Q posts are different than the file names from q.map.pub but that's to be expected no comms outside these boards right.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

6fe4e3 No.11665

File: 9082b610331834e⋯.jpg (498.25 KB,1500x1500,1:1,EVLtyQ1UMAA0Zhb.jpg)

File: c870a8ceb7d8fa9⋯.jpg (399.41 KB,1500x1500,1:1,Justice.jpg)

File: 11d4b4d84cf0fcb⋯.png (333.96 KB,1500x1500,1:1,Hunters_2_10_20_and_4_10_2….png)

I am new to Steg, Programming/Database background. Long time Q follower.

I am suspicious of the two "Hunters" posters from 2-10-20 and 4-09-20. They are the same canvas size (1500x1500) 8 bit gamma, but they are different physical file sizes. The pictures are slightly different quality.

WHY ?

Q doesnt do things like that without a reason. I am currently working with Stegcracker and looping through the Q image filenames as a password list. next list Stringers.

I need all the help I can get. Building the image filename list is time consuming and I have found no complete list of Q's image filenames, only partial.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.11674

File: 9d89560fb184302⋯.png (91.03 KB,609x901,609:901,CardanSteganography.png)

File: 2227ee1ad03b985⋯.pdf (829.7 KB,PictureCodeCardanGrill1803….pdf)

as posted

>>>/qresearch/8973193

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

cb4445 No.11680

YouTube embed. Click thumbnail to play.

Thought this was interdasting r.e. the flag pics do any of the ideas in here correspond to steg data etc.?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

6fe4e3 No.11711

File: 6dfaf6a744ae31e⋯.jpg (293.03 KB,1200x900,4:3,6dfaf6a744ae31edf73f3bb5ca….jpg)

File: 0546986d6c87a3f⋯.jpg (17.89 KB,255x191,255:191,6dfaf6a744ae31edf73f3bb5ca….jpg)

The flag photos posted by Q recently have the same filename, but different canvas sizes and physical disk sizes. in my uploads, the one filename has a "-2" appended.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

2ad1ee No.11727

File: 1ef1e3b6afa248a⋯.jpg (100.32 KB,784x295,784:295,Steeple_3988.jpg)

File: df0b7ae15ccec03⋯.png (94.88 KB,640x640,1:1,ExifTool.png)

File: 3c4c570dbebe381⋯.png (29.72 KB,417x502,417:502,847.png)

I ran the ExifTool on the Steeple from #3988 and found the author shows "events847".

Post #847 says "Watch the Water"

I found the original Steeple pic here, and running it through the ExifTool shows the same metadata. Still, there are no coincidences:

https://oldnorth.com/wp-content/uploads/2016/09/lclitlantern.jpg

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

c2987a No.13401

>>3266

check out StegoAppDB.

This is a HUUUUGE database of stego & original cover images used to train algorithms to identify steganography.

There are many machine learning stego projects up on github. Clone one of those bitches, import your clean set and your steg set for training… then go grab a bunch of "suspect images" from whatever board you want, and run them against your newly trained algo.

The one I suggest trying is PixelKnot. PixelKnot is an Android app that uses the F5 algorithm to do its thing. There is well over 300gb of PixelKnot pictures to play with on StegoAppDB, free to use & download.

You can obviously create your own sets as well by scripting tools, but this is an easy way to get started with KNOWN images.

#HappyHunting

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f5ea92 No.13457

>>11727

Wouldn't that go back to "Two if by sea"?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f5ea92 No.13458

>>13401

So someone with an Android device should get busy. #offthehook

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

4c7ff4 No.13487

File: cbf6dc4acc602f6⋯.png (47.53 KB,849x289,849:289,pdfToolz.png)

as posted

>>>/qresearch/9122180

>>>/qresearch/9121987

https://blackarch.org/tools.html

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

25e970 No.13545

>>13457

Yep, that was my thought.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

f5ea92 No.14198

YouTube embed. Click thumbnail to play.

Working with the Easton flag. There's a small row at the top. Using the stego video to get started.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
[]
[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]