To: exit82
Might have to change his name to Deep Sleepin' Joe. 😴
5,835 posted on
09/03/2019 7:57:13 PM PDT by
Jane Long
(Praise God, from whom ALL blessings flow.)
To: Jane Long; hoosiermama; exit82; weston
Luke Slytalker & The Force
Well just get right to the meat& potatoesI found a thing. Happening currently. Embedded PGP Encryption Key???
Inside of Jeffrey Epstein photos, uploaded by the NYPost.
Ive been sitting on this for a little bit, but when I saw that Jean Luc Brunel has disappeared now as well... I guess its time to release this.
BTWwas the NY Post the first to break this about Brunel?
So heres the backstory I had ran some Stego scans on the Ghislaine Maxwell photos from the NYPost article about her being spotted at In-n-Out. There was some odd hex seemingly embedded into the file. Im not used to seeing this, so I looked for other instances I could remember.
This side-by-side is a scan I ran on the Maxwell pic which I pulled off the NYPost CMS/content management system.
The image on the right half is a picture from the unsolved #Cicada3301 Liber Primus puzzle of 2014. You can see a similar set of hex embedded into the Cicada image.
A little bit ago, @csthetruth said I should check out the pics of #Epstein in the Orange color jump suit after his suicide. I found that the NYPost hosts their content directly on a Wordpress subdomain (http://thenypost.files.wordpress.com ) and their domain points there.
I scraped all the images I could find with a /Jeffrey-Epstein-*.jpg wildcard and got a ~dozen pics. One thing stood out was multiple copies of the same image. This is unnecessary & a waste of space. Wordpress can auto scale/crop/etc, so multiple versions would be redundant.
Usually, multiple images would make sense when you have maybe a high res & a thumbnail version, but the smallest of the file sizes was over 500kbdefinitely not a small JPG. Even stranger, the other 2 images were BIG: 1.6Mb and 1.8Mb.
That didnt make sense.
So, I scanned those pics firstthe context of there being 3 duplicate images was bugging me.
To my surprise, not only did ALL 3 of them have a little bit o fishyness to them (some hex and stuff in the EXIF), but one of the files seems to have a PGP key embedded using OutGuess!!
Again, I mentioned earlier OutGuess being used (In-n-OUT burger made OutGuess the first tool I wanted to run). If youre a follower of the Q boards, you probably know there are numerous instances of #steganography being used.
Heres some possible appended data on a Q post:
@GitmoChannel says he has found indication of F5 Stego in a number of images on the Q boards as well.
If you remember last July, there was a photoshopped pic of Sarah Silverman that alluded to using PixelKnot (F5 Stego). Point beingSteganography is pretty common.
Here are some more 4chan/8chan examples of seemingly normal pics, blending into the thread. (Coded messages/conversations)
Youd never know if you werent specifically looking for it...
Think:
Data exchange
EXPAND your thinking
You have more than you know
How do you HIDE a message in CLEAR sight? (JPHide? Alpha/transparency bits/LSBsteg?)
People are so quick to doubt things because they lack understanding. Its easier to believe something is false than to realize you are unaware/uninformed.
Things arent always as they seem
So back to the PGP keythere were some oddities. First, the file is on the large size according to a very astute colleague.
At almost 10k, this is a big key file. So, I went to try and locate examples of extra-large key sizes & was able to find an example of 16k key.
Why would someone want such a super-secret-extra-secure Key?? Uhhh... well, indulge me for a moment and assume youre a Mockingbird Media CIA contractor: You need to setup secret/secure comms with an asset/source/handler The bigger the key, the harder it should be to crack 🤷♂️
The key is binary data, but thats not unexpected. It may even be further encrypted, obfuscated, or even intentionally damaged (to make solving the puzzle harder).
As I was saying about intentionally damaged This is somewhat common in CTF/Capture The Flag challenges involving Steganography. Here is a walk-through Re: a CTF where a .ZIP file was hidden in an image, but the zip was intentionally damaged, requiring you to HEX EDIT to fix it.
I tried a small handful of things to figure out who the key belonged to & what it was securing, but Im not a PGP expert. 🔐😬 What next? Do I Binwalk & carve out those bytes? Hex editor? Im not 100% sure what Im looking to even fix/check exactly. 🤷♂️
So, here are all the files I grabbed from the NYPosts own website, outputs from scans, and the PGP Key/pair (binary) extracted out of one of the Jeffrey Epstein images.
Further info... I ran a number of tests with OutGuess, Steghide, and a few others Steganography tools, then tested the detection & extraction of controlled files (ones I KNEW had data, and ones I knew didnt)
OutGuess would find useable bits to extract, but it would then wrongly assume it was wrong and say probably no result..
However, forcing OutGuess to extract will reveal the hidden files that I knew were there (and then running file & have Linux squawk back the Type)
So, whats it all mean then?
Stego doesnt happen on accident.
Someone put that PGP Key in there intentionally Someone with access to the NY Posts website/CMS Seems like spy-craft The implication seems that #OperationMockingbird is at @nypost? 🤷♂️
Edgy Guy [4]
Have you figured out what the key is for? A local folder? A cloud drive?
Luke Slytalker & The Force.
Lazer Blazer
Have you looked into which articles have steno images and is there a correlation to article authors?
Luke Slytalker & The Force
Thats what all you guys are for now. 😉 I need the #hiveMind to jump in and pick up where I left off.
Not sure. Thats why I finally dropped the info. I was done looking into it.
Time for others to pick it up & see what they can add/contribute. 🤷♂️
Deplorable SQ
So my first question would be: If you find multiple pictures with embedded keys, are the keys the same or different. Lazyness would indicate the keys would be the same, but the best security would be if each photo had a newly generated key that would only be used once.
If a single message is cracked, then no other messages could be decrypted. In this mode, I would expect the embedded keys to be encrypted with additional keys. Also, no point in hiding secret keys when all you would need to pass are public keys, and no need to do that each time.
5,849 posted on
09/03/2019 8:54:19 PM PDT by
STARLIT
(Hope is standing in the dark looking out at the light in Jesus Christ.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson