The CPP website is using a thirdparty hosted CMS (hosting thousands of unrelated companies). The login form is just a way to log into the backend of the CMS. The file list was created by someone on 4chan by modifying the login form using inspector. The file list where all the files are gone (like they were suddenly deleted) was created by someone from the PG Discord (someone thinking to be some 1337 hacker=cracker, but actually just a scriptkiddie). The file is just a PDF containing the menu that can be downloaded from the frontend. This was already researched about 2 months ago. This research is really lacking organization.
Sorry guys, this is a total dead end. The number 4741080860 is the ID of the Menu stored in the database. So it's the same file being downloaded no whatever what file you put in the URL.
The files originally viewable in the protected part of the site were massive but heavily encrypted. The size made it very likely to be videos. My theory all along was that CPP was a transactional centerpoint/hub, with potentially most of the misdeeds off premise, possibly at Buck"s as one example.
The biggest zip file that was listed on their site appears to be around 25 Mb if the original file size is given in bytes (seen from the Youtube video)
I highly doubt they'd still have their files on their servers. If anything, it'd be a fake and I don't suggest pushing this. OP registered 39 minutes ago.
EDIT: Sorry for being skeptical, I'll at least give you props for proving that the screenshot of encrypted files is real.
Haha, I successfully unzipped them. Someone has just replaced them all with a folder containing random website images from their site. The file size 7.5mb is nowhere near the "original" zip file sizes. They have replaced the real files with fakes.
Here is the entire contents of the zip folder, and I tried 2 of them, same attachments in both:
http://sli.mg/R6rQsS
From what I read, was, when cometpingpong.com/protected didn't need a password to see the list of downloads (now you need a password just to access the list, then another password to download files) and you tried to download any file with a random key, it would obviously recognise that the download key is incorrect and download the default file, which seems to be this ~7.5mb menu file.
You need the correct download key otherwise you'll not get the actual file.
EDIT: HMM. The menu when you download from the official link from their menu page is only 200KB. The zip file that shares the same file ID # 4750801860 opens as a PDF when renamed - yet it's an 8 MB pdf.
This could be evidence that blows this thing wide open if one could only decrypt the files. Please share!
Edit: Like rutkdn mentioned, that zip file appears to be just a pdf file and opens when the file extension is renamed. Does anyone have any of the files that appeared on the website?
DiggingforTruth ago
Wow. Serious sleuthing!! Way to go!
KiRa2115 ago
They turned it into a honey pot the 2nd day of pizzagate.
deorder ago
The CPP website is using a thirdparty hosted CMS (hosting thousands of unrelated companies). The login form is just a way to log into the backend of the CMS. The file list was created by someone on 4chan by modifying the login form using inspector. The file list where all the files are gone (like they were suddenly deleted) was created by someone from the PG Discord (someone thinking to be some 1337 hacker=cracker, but actually just a scriptkiddie). The file is just a PDF containing the menu that can be downloaded from the frontend. This was already researched about 2 months ago. This research is really lacking organization.
fartyshorts ago
Why so many versions of the same file?
deorder ago
They were all the same, not different versions. All the same PDF. Could not find anything inside. You may check it out for yourself.
dannonyme ago
No, calling a pedophile "Mr" doesn't give you away at all! LOL
RecycledUser ago
This isn't directed at OP, but just a reminder to any newbies, to be cautious of honeypots, and possible setups to get someone to download CP.
RecycledUser ago
Sure thing, shill.
ShabbaStoney ago
Sorry guys, this is a total dead end. The number 4741080860 is the ID of the Menu stored in the database. So it's the same file being downloaded no whatever what file you put in the URL.
reasonedandinformed ago
The files originally viewable in the protected part of the site were massive but heavily encrypted. The size made it very likely to be videos. My theory all along was that CPP was a transactional centerpoint/hub, with potentially most of the misdeeds off premise, possibly at Buck"s as one example.
followthemoney ago
https://youtu.be/QCdprP2IyV8
ShabbaStoney ago
Well it seems a dead end, was worth a try.
delivery1 ago
The biggest zip file that was listed on their site appears to be around 25 Mb if the original file size is given in bytes (seen from the Youtube video)
redberries ago
I highly doubt they'd still have their files on their servers. If anything, it'd be a fake and I don't suggest pushing this. OP registered 39 minutes ago.
EDIT: Sorry for being skeptical, I'll at least give you props for proving that the screenshot of encrypted files is real.
Fateswebb ago
I thought we were invite only right now...
RecycledUser ago
That would be nice.
28leinad82 ago
they are fake files, they have replaced all real files with a standard 7.4mb zip containing boring website images.
fartyshorts ago
Yeah, I can confirm this. They have all been replaced by the same file.
B3nder ago
wasn't their computer/server "shot" by the false flag guy ?
ShabbaStoney ago
Yes because I needed to be registered to submit a thread.
EDIT: No worries, I would have probably been the same. I'm new to this voat thing :)
DarkMath ago
You need to archive this somehow in case they delete that file.
Thakiddds ago
Upvoat
ShabbaStoney ago
Seems very strange for a PDF to be stored as a zip
28leinad82 ago
Haha, I successfully unzipped them. Someone has just replaced them all with a folder containing random website images from their site. The file size 7.5mb is nowhere near the "original" zip file sizes. They have replaced the real files with fakes.
Here is the entire contents of the zip folder, and I tried 2 of them, same attachments in both: http://sli.mg/R6rQsS
n0mar ago
From what I read, was, when cometpingpong.com/protected didn't need a password to see the list of downloads (now you need a password just to access the list, then another password to download files) and you tried to download any file with a random key, it would obviously recognise that the download key is incorrect and download the default file, which seems to be this ~7.5mb menu file.
You need the correct download key otherwise you'll not get the actual file.
ShabbaStoney ago
Just curious, how did you manage to unzip them?
28leinad82 ago
i just used a mac app called "unarchiver". it unzipped them straight away. none of my other zip apps worked.
ShabbaStoney ago
Interesting, I wonder if any of the PDF files in the podesta emails can be changed to ZIP's and unarchived.
28leinad82 ago
which PDFs were "Archived" or encrypted in his emails?
rutkdn ago
This particular file is a PDF. Rename .zip to .pdf and it's their menu. I'm not saying there isn't anything else hiding in this 7 meg file though.
Also available from this URL: https://www.cometpingpong.com/app/download/4750801860/Comet+Ping+Pong+menu.pdf?t=1437072342
EDIT: HMM. The menu when you download from the official link from their menu page is only 200KB. The zip file that shares the same file ID # 4750801860 opens as a PDF when renamed - yet it's an 8 MB pdf.
golly ago
Interesting! Did you do a diff/strings? You might be able to spot more than one header/footer in there.
28leinad82 ago
I'll have a go... do you have a list of all the URLs?
zoltan907 ago
https://sli.mg/a5Fcpn
delivery1 ago
This could be evidence that blows this thing wide open if one could only decrypt the files. Please share!
Edit: Like rutkdn mentioned, that zip file appears to be just a pdf file and opens when the file extension is renamed. Does anyone have any of the files that appeared on the website?