It is a well-known fact that in the pedophile comunity the use of stenography is a standard practice.
This video digs into Comet Ping Pong’s Website and shows how they link directly to SchweinpegResearch’s youtube where they have a video, here, that shows how to hide porn with Stegnography, specifically Semantic-Field Shift Computations (ADCASEFCO). For me this is no coincidence but a deliberate education for people inside their sick network of child fuckers.
John Podesta's Email Leaks have Odd Files and are at the center of Pizzagate.
Here in a Federal Cyber security File we learn how John Podesta is an Expert in the Stegnography process
>Clinton's White House Chief of Staff, John Podesta, was an important influence in this (stegnography) process" -page 169
US intelligence is 'state of the art' and the Poedsta broz are in Deep with the Deep State.
Anthony (Tony) Podesta says. Source archive
"I'm software," says Podesta. "I'm a server, I'm a switch." Whatever the metaphor, he's closing deals that leave everyone happy.
>"..... not so much of a tech guy," Podesta demurs. "What I really am is a translator."-
There appears to be steganography hidden content in the .pps files in the Podesta Wikileaks Emails... There is odd encryption when viewing them as an archive through 7 zip. With the new (28 April, 2017) revelations from WikiLeaks leaked CIA watermarking tool Scribbles may be part of the solution.
These papers, Here , here and Here all are articles published from China that clearly show how data can be hid in various aspects of powerpoint files. Not much coming from other countries, I wonder why? Some of the key details they note is how they use animations, delays, and auto start functions to increase the amount of ‘space’ available to hide data.
In another good paper from Korea we see EnCase Forensic Technology for Decrypting Stenography Algorithm applied in the PowerPoint file
In this paper, we conducted a research where analysed types of hidden information in the PowerPoint using the EnCase find out hidden message.
Here is a more modern publication titles: STEGANOGRAPHY: FORENSIC, SECURITY, AND LEGAL ISSUES
>Steganography also presents new challenges for digital forensic investigators, security personnel, enterprise managers, law enforcement officials, courts, and lawmakers. It will add to the complexity and quantity of the digital forensic workload, security measures, and development of case law. Future research of steganography and steganalysis should be encouraged for both academics and practitioners.
HERE ARE SOME Questionable Emails from John Podesta
https://wikileaks.org/podesta-emails/emailid/58369
This one for sure, there is nearly 4 gig of PowerPoint xml data, there should only be a few megabytes of data.
https://wikileaks.org/podesta-emails/emailid/55900
Here are other good threads relating to Stego and Pizzagate
Podesta, Pedophilia, Steganography, Secret Files — Is Hillary Clinton One Step Closer to Prison for Pedophilia, Fraud, and Treason?
https://phibetaiota.net/2016/11/owl-podesta-pedophilia-steganography-secret-files-is-hillary-clinton-one-step-closer-to-prison-for-pedophilia-fraud-and-treason/ http://dailyteasip.com/hillary-one-step-closer-prison-assange-reveals-new-hidden-human-trafficking-ring-shocking/
RECENT reddit on Wikileaks Scribbles and Pizzagate
https://www.reddit.com/r/conspiracy/comments/66uki8/pizzagate_update_bullshit_artists_james_alefantis/
LHOHQ https://voat.co/v/pizzagate/1768269
http://techmantraservices.com/source-code-for-cias-tool-to-track-whistleblowers-leaked-by-wikileaks.html
https://beforeitsnews.com/alternative/2017/04/with-all-eyes-on-the-war-this-goes-purposefully-ignored-what-theyre-distracting-you-from-seeing-3505259.html
https://www.reddit.com/r/conspiracy/comments/5cq57i/steganography_and_the_podesta_email_attachments_i/
https://conservativedailypost.com/julian-assange-isnt-done-with-hillary-reveals-hidden-human-trafficking-network/
https://voat.co/v/pizzagate/1815655
One of the main tricks ARG tech the kids they groom is steganography, look at the ARG explanations of siivagunners, calliou, stenography is to lead the kids playing ARG to thier next destination, which eventually leads to dark web type videos
https://voat.co/v/pizzagate/1536160/7478089
Now, the thing is that when I try to use Jphide to uncover the data it asks for a password, and the only thing I had to try with was the filename, but because I originally found the image from THIS site http://hollaforums.com/thread/8067477/politics/open-directory-found-from-the-podesta-emails-large.html and on the site the image was called "1477744604436.jpg"
https://voat.co/v/pizzagate/1628105
https://voat.co/v/pizzagate/1581748
photoset of Antarctica
https://voat.co/v/pizzagate/1479205
https://voat.co/v/pizzagate/1445121
Another lead on Pegasus, suggestions for further inquiry https://voat.co/v/pizzagate/1542733
https://voat.co/v/pizzagate/1499089
The beginnings of WorldCorp https://yuki.la/x/17941762
Here are some POSSIBLE TOOLS to extract stego files
https://en.wikipedia.org/wiki/Steganography_tools 'Outguess' is the tool referenced is the first Cicada puzzle. http://uncovering-cicada.wikia.com/wiki/OutGuess
"jphide": http://i.imgur.com/a3pUmpH.jpg
A Secure Robust Image Steganographic Model
Yeuan-Kuen Lee and Ling-Hwei Chen
Department of Computer and Information Science
National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C.
WHERE IS TZIPI MAZUZ? -an Israili Cryptologist 'missing' since 1-27-17,while investigating the stenographic content in John Podesta's emails. What is #8 ?
https://voat.co/v/pizzagate/1768004
Here is a tweet from her 12-11-16 where she say
Not what it seems:
and posts a link to this email in the Wikileaks emails
Shortly after that post her twitter account went down. She tweeted a lot. Here is a link to a /r thread talking about the 'disconect'
One of her associates Peter posts about this 'hidden' information. The video shows the images from the Wikileaks email noted herein. The content 'behind the images' was to be released. Then silence.
Peter tweets one of his last tweets regarding Tzipi's status.
Gothamgirl ago
I follow Trutherbots website & videos so I think I get it.
Gothamgirl ago
I would imagine so, what I have seen so far goes far beyond pizzagate.
Gothamgirl ago
Sorry, I must have missed that. Can you tell me what that means?
thisHoCwilltumble ago
I'm not seeing a 4gb file?
jangles ago
By the way, Thank you for this https://voat.co/v/pizzagate/1463116
jangles ago
Cryptography and Caves jive.
Ihatepizza2 ago
"Openpuff" is the latest steganography tool that has started to be used in the ARG sphere.
twistedmac11 ago
Search "mail2000" in Wikileaks; lots of Chinese(?) emails w/ attached files, probably encrypted.
thisHoCwilltumble ago
I'm sure if we can figure out the stenography this is it. I've been opening these powerpoints in google docs and theyre really obscure. if you are using chrome rightclick and translate the pages, they have some strange names.
the first one is literally a bunch of handkerchiefs! https://wikileaks.org/podesta-emails/emailid/58207
a few other strange ones: https://wikileaks.org/podesta-emails/emailid/5839 some worldcorp-like vaporwave imageery in this one: https://wikileaks.org/podesta-emails/emailid/1804 chrome translates part of this as "You can watch the whole world. Mind Travel Universe" https://wikileaks.org/podesta-emails/emailid/33732
Gothamgirl ago
Some of the files have kids pics that are visible to, before the encryption part.
Gothamgirl ago
Thank you for posting this. I have been trying for a week to open some suspect files. Hopefully this works.
jangles ago
WTF- I didn't archive these 3 Chinese papers before I posted this and now I can't open them, is this just me?
thisisnotagame ago
nope, can't open them either :(
jangles ago
Odd but here are other links- Peer Reviewed papers are hard to 'delete'
Here is # one
A steganographic method via various animations in PowerPoint files Wen-Chao Yang & Ling-Hwei Chen
https://pdfs.semanticscholar.org/3759/2110f4091332e49ccc4a30e5e6ae4a5fe41b.pdf
two- now pay only :(
A novel steganography method via various animation effects in PowerPoint files
http://ieeexplore.ieee.org/document/4620941/?part=1
3....
Gothamgirl ago
This stuff is so foreign to me. The program above looks like it is only for the coding in the beginning of a file but not extraction. If we are able to get that far, I have a password for one specific email, and an idea where to find the rest.
ben_matlock ago
Not opening for me either..