Remember this thread?
The user found that in one of the podesta emails, an image tested positive to a steganography method called JPHIDE. In non technical terms this means that hidden data (text message, other image, or any other file) has been intentionally encoded in the image itself. If someone managed to find the password, he or she would have access to the hidden data, which in turn could potentially be a smoking gun.
view the rest of the comments →
DarkMath ago
I vaguely recall this discussion over on reddit 3 months ago. Someone claimed to have gotten past the password prompt using the name of the file as the password.
I'm not positive and it may have been another image. Anyway have you tried the password is the file name?
newworldahead ago
Hmm, just tried it but no luck. (tried with the .jpg extension and without).
DarkMath ago
Try searching reddit or 4chan for how they did it. It might not be the file name or it may be an embedded filename. I'm certain there's a discussion about it.
@johnlupus
newworldahead ago
Yes it was for another image I think. The hidden data was a flag with a owl on it if I recall correctly. The password to decrypt the thing was the SMTP Id of the email.
I tried it with the "Action Shot" image but it doesn't work.
Edit: Found this comment https://voat.co/v/pizzagate/1536160/7478089
privatepizza ago
Yea, the only image I saw decrypted on the Chans was the owl and flag
equineluvr ago
It was of Minerva, the Roman goddess of War (represented by owl).
https://en.wikipedia.org/wiki/Minerva
The Owl image creates the pentagram over D.C. that CPP is on the tip of.