Posted on 11/17/2016 7:55:31 AM PST by Non-Compliant_Deplorable
[The author has been] reporting for weeks now about the D.C.-based pizza pedophilia ring that is being exposed based on thousands of Podesta emails released by Wikileaks in the past month or two.... reported weeks ago about this pedo ring and something called photo steganography...[data encrypted in photos]...hidden data could literally just be a few bits of information but it could open up thousands of gigabytes of data in the right website or compressed file. Thats how the users would access the dirty pictures, videos, messages, etc....from a technical angle, this method is very possible, and it makes sense of why the Podesta emails include so many strange photo attachments. Are all those attachments little Trojan ponies for sharing images, videos, passwords, payment resources, etc.?
(Excerpt) Read more at conservativedailypost.com ...
They may have actually been saying “force the children,” and we just didn’t hear quite clearly.
“And your credentials in steganography are...?”
Meh, it doesn’t take “credentials in steganography” to confirm there is no hidden zip file in this picture. The pkzip file format is public, anyone with a decent knowledge of computing can examine the file in question and verify for themselves that it does not contain anything resembling a pkzip file header or signature. Don’t take my word for it, go do it yourself and confirm it.
“I mean: the whole point of hiding a file in a picture is its not obvious that youre hiding a file in a picture.”
Obviously, but if you do hide a file in a picture in a certain way (which is what the posters in the original 4chan thread were claiming they found), then it is easy to verify if such a file is there or not.
“Did you examine the least significant bits in the color data?”
Unnecessary to disprove the claim.
“Did you confirm all data is used by the image, and none is extraneous nor errors?”
Unnecessary to disprove the claim. Remember the claim is not “there might be some data hidden in this file”. The claim was “there is a pkzip file hidden in this file because we found the bits corresponding to a pkzip header”. To disprove a more nonspecific claim, yes you would need to do a lot more analysis, but to disprove the specific claim, all one needs to do is compare the bits in the file to the pkzip file format.
bump
Yoga and pizza parties. Nothing of importance in Hillary’s deleted emails.
For later.
Oh yeah. Silsby had no paper from the Haitian government, no paper from the Dominican Republic, the children often weren't orphans, she got the children, often from their parents, under false pretenses (vacation for the kids), had no orphanage or adoption agencies lined up for the children, in short looked like simple kidnapping children in Haiti for sale to unspecified parties.
John Podesta had thousands of emails talking about food, in ways that were clearly coded messages. From context the emails were not about food, money, or drugs, leaving sex. From context it appears child sex was offered to many wealthy individuals and politicians (did I repeat myself here?). FBI needs bodies to match the emails - since this went very public in October, my guess is that the bodies will be as easily found as that of D.A. Ray Gricar, who was investigating Jerry Sandusky and his associates when he went missing in 2005. His laptop was recovered, sans hard drive. Gricar remains missing to this day.
Without live bodies, it is very difficult to make the case. No one from the Clinton campaign (Podesta was chairman of the campaign) is denying that the emails are legit. Seth Rich might have more info on all this, but he is unable to communicate (being shot dead will do that to you).
Even a pardon cannot protect her from the Hague.
Okay..thanks for the expertise
Image staganography uses the lower value bits to hide a message. If you use a stego detector, it may pick up a stego’d but unencrypted zip header, with the person hiding the zip relying on the zip crypto to hide the contents. Examination of the jpeg code itself would not reveal the header, you’d need to know the type of steganography to uncover the header.
I have a steganography detector plugin for my browser that will detect but not necessarily decrypt a stegged file. R-click an image, select “Check selected image/text for stego” and it says yes/no and what type of steganography was used. A different plugin will take an image or text file and stuff it.
Using stego on a music file is similar and is better for large images because .wav music files are large.
ping
I have no idea if all this about John Podesta, Comet Pizza, etc is true. But I do know the human trafficking and sex trafficking industries are the fastest growing criminal activity in the world (faster than any other type of organized crime including drug sales). It is high profit and low risk, and sex trafficking is a billion dollar a year industry. So for someone or group who is seeking money and power, gained quickly and secretly with little risk of being caught, to advance their own agenda...it fits the bill for that purpose. It is monstrously, horribly evil - a modern day slave trade -
I’m praying daily for Donald Trump’s protection as the powers of evil in this country are just rabidly demonic right now.- they are not wanting to get caught and know their time is short if he becomes president.
I can’t understand Turkish..but it is interesting to see what they dug up on this topic
https://www.youtube.com/watch?v=g_PeajGbHRY
I think I heard George Soros in there.
Notice the Heil Hitler type of pic of Podesta.
Dude does an investigation into Comet Ping Pong....I haven’t watched it because he shows the inside, etc.
https://www.youtube.com/watch?v=OaHl7BL9zhU
there are three parts
This has something about an upstairs room
https://www.youtube.com/watch?v=UROJCpxpBM4
There is weird pic of a ladder..its a pic inside one of these places
and they desribe some weird stuff
What’s the bottom line to what you just posted...because it is far above anything I understand
Is it possible something was hidden in that photo or is it just a wild goose chase.
You should take a look at this dude who decided to go investigate Comet Pizza and did a periscope of it.
Its in three parts.
The last video describes some stuff they saw
https://www.youtube.com/watch?v=UROJCpxpBM4
Btw, they are going to go investigate some address where the instructions are to leave the pizza on the ground and do not knock. it was a sign taped on the wall.
Thanks, I’ll watch it this evening. That’s Jack Posobiec, one of the new, young independent journalists who’s doing some great stuff. His twitter feed is quite informative:
https://twitter.com/JackPosobiec
Another up-and-comer is Mike Cernovich:
I tried to find a tweet for his listing the address for the leave the pizza on the ground thing. He said he would tweet it. If you see that anywhere please post.
Bump.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.