I was using a Steganography detection software and it flagged the following image as using a steganography method called "jphide": http://i.imgur.com/a3pUmpH.jpg
Now, the thing is that when I try to use Jphide to uncover the data it asks for a password, and the only thing I had to try with was the filename, but because I originally found the image from THIS site http://hollaforums.com/thread/8067477/politics/open-directory-found-from-the-podesta-emails-large.html and on the site the image was called "1477744604436.jpg" (which does not seem to be the original name from the Podesta emails because when I searched for that filename it didn't come up with any results). I therefore need YOUR help in finding the Podesta e-mail from where this photo was taken from, so that we can see if there are any suggestions of a password that we can use to crack the image file. Most probably the password will be the name of the original file, so if ya'll PLEASE can help me locate this photo from the Podesta e-mails we might have a chance to uncover what's hidden in this file!!
For anyone who's interested, this is how it looked when I scanned the photos. You will see that the photo in question is flagged as being encrypted with "jphide" steganography method: http://i.imgur.com/VtlG3My.jpg
God Bless!
view the rest of the comments →
Neverhillary1030 ago
COmments are fucking blocked on VOAT WAHT THE FUCCCCCCCCCCCCCCK. OP its ME IDeliverPizza. Promise you will check in every 5 mins. Also, the cards on the table were K of spades. 8 of diamonds. 4 of spades. 7 of diamonds. EVERYONE SHOULD BE SCOURING WIKI RIGHT NOW FOR THIS PASSWORD THIS COULD BE IT FOLKS!!!!!!!
FoxMcCloud11 ago
How so?
FoxMcCloud11 ago
Fuckkkkkkkkkk lol
8toborrm ago
??
FoxMcCloud11 ago
Someone kept typing fuck in all CAPS - so I was just joking in