You are viewing a single comment's thread.

view the rest of the comments →

jangles ago

Here are some papers on the methods used to embed the data in these pps files - it is obvious there is something in them -

 

A Steganographic method via various animations in PowerPoint files Wen-Chao Yang & Ling-Hwei Chen Multimed Tools Appl DOI 10.1007/s11042-013-1708-1 Springer Science+Business Media New York 2013

http://debut.cis.nctu.edu.tw/Publications/pdfs/J57.pdf

  Microsoft Power Point Files: A Secure Steganographic Carrier 2011 Rajesh Kumar Tiwari, RVS College of Engineering & Technology, India G. Sahoo, Birla Institute of Technology (BIT) Mesra, India

http://divefor.org/Publications/Paper20.pdf

 

Podesta’s PPS files have sounds, lots of animations, delays, auto start, etc eg. https://wikileaks.org/podesta-emails/emailid/58369

 

Verify Yourself! Download the .pps files from Podesta WikiLeaks 7zip and ‘Open Archive’ watch the file in Microsoft PowerPoint, pay attention to the exact timing it takes for sound effects animations and events that take place, review the peer reviewed journal articles about the Stego .ppt and .pps then make your own judgment. Or find some way to crack the encryption. The methods are obvious the keys are unknown.