DiggingforTruth ago

Wow. Serious sleuthing!! Way to go!

KiRa2115 ago

They turned it into a honey pot the 2nd day of pizzagate.

deorder ago

The CPP website is using a thirdparty hosted CMS (hosting thousands of unrelated companies). The login form is just a way to log into the backend of the CMS. The file list was created by someone on 4chan by modifying the login form using inspector. The file list where all the files are gone (like they were suddenly deleted) was created by someone from the PG Discord (someone thinking to be some 1337 hacker=cracker, but actually just a scriptkiddie). The file is just a PDF containing the menu that can be downloaded from the frontend. This was already researched about 2 months ago. This research is really lacking organization.

fartyshorts ago

Why so many versions of the same file?

deorder ago

They were all the same, not different versions. All the same PDF. Could not find anything inside. You may check it out for yourself.

dannonyme ago

Mr. Alefantis

No, calling a pedophile "Mr" doesn't give you away at all! LOL

RecycledUser ago

This isn't directed at OP, but just a reminder to any newbies, to be cautious of honeypots, and possible setups to get someone to download CP.

RecycledUser ago

Sure thing, shill.

ShabbaStoney ago

Sorry guys, this is a total dead end. The number 4741080860 is the ID of the Menu stored in the database. So it's the same file being downloaded no whatever what file you put in the URL.

reasonedandinformed ago

The files originally viewable in the protected part of the site were massive but heavily encrypted. The size made it very likely to be videos. My theory all along was that CPP was a transactional centerpoint/hub, with potentially most of the misdeeds off premise, possibly at Buck"s as one example.

ShabbaStoney ago

Well it seems a dead end, was worth a try.

delivery1 ago

The biggest zip file that was listed on their site appears to be around 25 Mb if the original file size is given in bytes (seen from the Youtube video)

redberries ago

I highly doubt they'd still have their files on their servers. If anything, it'd be a fake and I don't suggest pushing this. OP registered 39 minutes ago.

EDIT: Sorry for being skeptical, I'll at least give you props for proving that the screenshot of encrypted files is real.

Fateswebb ago

I thought we were invite only right now...

RecycledUser ago

That would be nice.

28leinad82 ago

they are fake files, they have replaced all real files with a standard 7.4mb zip containing boring website images.

fartyshorts ago

Yeah, I can confirm this. They have all been replaced by the same file.

B3nder ago

wasn't their computer/server "shot" by the false flag guy ?

ShabbaStoney ago

Yes because I needed to be registered to submit a thread.

EDIT: No worries, I would have probably been the same. I'm new to this voat thing :)

DarkMath ago

You need to archive this somehow in case they delete that file.

Thakiddds ago

Upvoat

ShabbaStoney ago

Seems very strange for a PDF to be stored as a zip

28leinad82 ago

Haha, I successfully unzipped them. Someone has just replaced them all with a folder containing random website images from their site. The file size 7.5mb is nowhere near the "original" zip file sizes. They have replaced the real files with fakes.

Here is the entire contents of the zip folder, and I tried 2 of them, same attachments in both: http://sli.mg/R6rQsS

n0mar ago

From what I read, was, when cometpingpong.com/protected didn't need a password to see the list of downloads (now you need a password just to access the list, then another password to download files) and you tried to download any file with a random key, it would obviously recognise that the download key is incorrect and download the default file, which seems to be this ~7.5mb menu file.

You need the correct download key otherwise you'll not get the actual file.

ShabbaStoney ago

Just curious, how did you manage to unzip them?

28leinad82 ago

i just used a mac app called "unarchiver". it unzipped them straight away. none of my other zip apps worked.

ShabbaStoney ago

Interesting, I wonder if any of the PDF files in the podesta emails can be changed to ZIP's and unarchived.

28leinad82 ago

which PDFs were "Archived" or encrypted in his emails?

rutkdn ago

This particular file is a PDF. Rename .zip to .pdf and it's their menu. I'm not saying there isn't anything else hiding in this 7 meg file though.

Also available from this URL: https://www.cometpingpong.com/app/download/4750801860/Comet+Ping+Pong+menu.pdf?t=1437072342

EDIT: HMM. The menu when you download from the official link from their menu page is only 200KB. The zip file that shares the same file ID # 4750801860 opens as a PDF when renamed - yet it's an 8 MB pdf.

golly ago

Interesting! Did you do a diff/strings? You might be able to spot more than one header/footer in there.

28leinad82 ago

I'll have a go... do you have a list of all the URLs?

delivery1 ago

This could be evidence that blows this thing wide open if one could only decrypt the files. Please share!

Edit: Like rutkdn mentioned, that zip file appears to be just a pdf file and opens when the file extension is renamed. Does anyone have any of the files that appeared on the website?