Here is a tweet from her 12-11-16 where she say
Not what it seems:
and posts a link to this email in the Wikileaks emails
Shortly after that post her twitter account went down. She tweeted a lot. Here is a link to a /r thread talking about the 'disconect'
One of her associates Peter posts about this 'hidden' information. The video shows the images from the Wikileaks email noted herein. The content 'behind the images' was to be released. Then silence.
Peter tweets one of his last tweets regarding Tzipi's status.
Here is a retweet where Tzipi says "Now we gear up for Phase Two #8" What is #8?
Here are some historical threads talking about Tzipi- They have good comments worth reading if you are interested.
https://voat.co/v/pizzagate/1461890
https://voat.co/v/pizzagate/1439861
https://voat.co/v/pizzagate/1479205
https://voat.co/v/pizzagate/1439861
[–] Thrash57 1 points (+1|-0) 4 months ago
Two nights ago @phan_sye tweeted he had made a major breakthrough. An hour later his twitter account vanished.
Last night on this subverse a member claimed to be @phan_sye. He stated that members of twitter had told him to come here with info. He claimed the NSA was trying to geolocate him via his tweets. He also claimed his last 29 tweets never hit twitterverse, but instead wemt straight to the nsa.
Here is a /r thread about the content allegedly embedded in the Podesta files.
The US intelligence is 'state of the art' and the Poedsta brothers are deep in bed with the deep state. "..... not so much of a tech guy," Tony Podesta demurs. "What I really am is a translator."-wired archive
"Clinton's White House Chief of Staff, John Podesta, was an important influence in this (stegnography) process." -page 169 http://www.federalcybersecurity.org/CourseFiles/FITSI%20Exam%20Guides/Study%20Guide%20for%20FITSP-M.pdf
How about is brother Anthony (Tony)?- ["He's a router," says a White House adviser. "I'm software," says Podesta. "I'm a server, I'm a switch."Whatever the metaphor, he's closing deals that leave everyone happy."] - wired archive
The Millennium Copyright Laws protect steganography from cryptography laws. Here is an old link talking about the implications associated with:
hiding messages within larger data files—and its use in espionage and digital rights management.
Here is a more modern publication titles: STEGANOGRAPHY: FORENSIC, SECURITY, AND LEGAL ISSUES
here are some questionable Podesta emails that may have hidden content.
https://wikileaks.org/podesta-emails/emailid/55900
this one odd doc files from Hawii/China https://wikileaks.org/podesta-emails/emailid/2417
Why is this named 'magic memory'? https://wikileaks.org/podesta-emails/emailid/26501
Can anyone provide any information regarding the health and life of Tzipi Mazuz? Does anyone know what #8 is in regard to?
view the rest of the comments →
CardinalOfKek ago
Err guys theres a lot more of that kind of stuff in there. There have been efforts to get to the bottom of the base 64 encoded email with obvious stenography in them. If you compile them you get bizzare images such as a UFO over water and 4 arms, some childs with Disney tracking bands over a guys crotch. There are over 30 there. Search the email for Base 64 or Base64.
neurofluxation ago
link?
CardinalOfKek ago
God to the Podesta emails. You will find emails in Base 64 in plain text. You need to compile them and the produce photos. Just search for Base64 or Base 64. Also thay all come from verizon cell phones in the San Fran Bay area worringly.
I dont know of any threads on this outside of 8Chan... dont ask me whereabouts I picked it up in that mess, but yeah its legit and really strange. I have two of the images here but this thing only allows embeds..... I can put it somewhere... its on my twitter somewhere @cardinalofKek
neurofluxation ago
Base64 doesn't require compiling. Furthermore, loads of images are base64 - such as this one - they don't have to be nefarious. If things were hidden inside of anything, they wouldn't be base64 - because it's easily reversed.
CardinalOfKek ago
oh but the images are. Base 64 plain text emails do not make sense especially with the bizzare artifacts once output as JPeg or PNG. You have to work out the encryption type.