I was using a Steganography detection software and it flagged the following image as using a steganography method called "jphide": http://i.imgur.com/a3pUmpH.jpg
Now, the thing is that when I try to use Jphide to uncover the data it asks for a password, and the only thing I had to try with was the filename, but because I originally found the image from THIS site http://hollaforums.com/thread/8067477/politics/open-directory-found-from-the-podesta-emails-large.html and on the site the image was called "1477744604436.jpg" (which does not seem to be the original name from the Podesta emails because when I searched for that filename it didn't come up with any results). I therefore need YOUR help in finding the Podesta e-mail from where this photo was taken from, so that we can see if there are any suggestions of a password that we can use to crack the image file. Most probably the password will be the name of the original file, so if ya'll PLEASE can help me locate this photo from the Podesta e-mails we might have a chance to uncover what's hidden in this file!!
For anyone who's interested, this is how it looked when I scanned the photos. You will see that the photo in question is flagged as being encrypted with "jphide" steganography method: http://i.imgur.com/VtlG3My.jpg
God Bless!
view the rest of the comments →
amCassandraAMA ago
https://wikileaks.org/podesta-emails/emailid/35941
try the SMTP ID of the email
and or try using different software: http://hanynet.com/isteg/ that was used to decode a different image. (https://i.sli.mg/nl49s7.jpg))
just look how the people parroting my efforts have tripple and quadrupple the upvoats of me.. yes Im salty lol
NoRagrets ago
Started replying, but decided it deserved a chain of it's own
https://voat.co/v/pizzagate/1536160/7478089
Laserchalk ago
Were those images found inside that image?