Anonymous ID: c08229 May 3, 2018, 11:40 a.m. No.1287618   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7632

>>1286065

A guaranteed unique identifier includes a reference to the network address of the UUID generating host, a time stamp and an arbitrary component. Because network addresses for each computer vary, the time stamp is also different for each generated UUID. Thus, two different host machines exhibit sufficient levels of uniqueness. The randomly created arbitrary component is added for enhanced security.

 

UUIDs are also part of the Tmodel data structure, which is a service type in the Universal Description Discovery and Integration (UDDI) registry used for Web service discovery.

Anonymous ID: c08229 May 3, 2018, 11:42 a.m. No.1287632   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>1286065

>>1287618

Universal Description, Discovery and Integration (UDDI, pronounced /หˆjสŠdiห/) is a platform-independent, Extensible Markup Language protocol that includes a (XML-based) registry by which businesses worldwide can list themselves on the Internet, and a mechanism to register and locate web service applications. UDDI is an open industry initiative, sponsored by the Organization for the Advancement of Structured Information Standards (OASIS), for enabling businesses to publish service listings and discover each other, and to define how the services or software applications interact over the Internet.

 

UDDI was originally proposed as a core Web service standard.[1] It is designed to be interrogated by SOAP messages and to provide access to Web Services Description Language (WSDL) documents describing the protocol bindings and message formats required to interact with the web services listed in its directory.

Anonymous ID: c08229 May 3, 2018, 2:58 p.m. No.1289391   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5818 >>0350 >>6810

>>1289141 Synopsis::

 

No Such Agency accidentally releases IT ALL Into the Cloud? Using Oracle Products?

 

[CLAS-N-DI_9] gg_dump [No Such Agency].

 

It does not technically exist as open-source. dump is there, but technically not there

 

In order to 'read the dump you need a key. Get it?

 

The graphic is your key. Notice it says 'your key' and not 'the key' as elsewhere.

 

Where is the key???

 

Military Intelligence, No Such Agency = key They Provide the key to NSA accidental dump of all

 

How to find??????

 

Graphic is necessary and vital. โ†โ€”โ€“

 

Graphic is essential. โ†โ€”

 

Find the ke[y]stone. โ†โ€”

 

But, what graphic[s]???

 

This/These. >>1286183 โ†โ€”

Anonymous ID: c08229 May 3, 2018, 3:17 p.m. No.1289573   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

http://smallbusiness.chron.com/decrypt-messages-embedded-within-images-50077.html

 

Decrypting Digimarc-Encoded Images with Photoshop

 

  1. Open Adobe Photoshop by double clicking its icon.

 

  1. Select "Open" from the "File" menu. In the file selector box, locate the file with the embedded Digimarc watermarking message and double-click it to open it.

 

  1. Choose the "Filter" option from the menu bar and scroll down to the "Digimarc" open. A menu will pop-out to the right. Select "Read Watermark" from that menu and click it.

 

  1. Select the "Web Lookup" button in the Digimarc dialog box that pops up to learn more about the creator of the image. It will open a lookup page in a separate browser window.

 

  1. Close the Digimarc dialog box in Photoshop by clicking on its "OK" button.

Decrypting OpenPuff Encoded Files

 

  1. Open the OpenPuff application by double-clicking on its icon.

 

  1. Click the "Unhide" button.

 

  1. Enter the password or passwords to decrypt the hidden message. Each image will have at least one password, which you should enter in the "Cryptography (A)" box, and may have as many as two more which go, respectively, in the "(B)" and "Scrambling (C)" boxes. If the image does not have a second or third password, unclick the "Enable (B)" and/or the "Enable (C)" boxes located under the field for password B.

 

  1. Select the file with the hidden image by clicking the "Add Carriers" button in the lower-left corner of the Open Puff Screen, selecting the file and double-clicking it.

 

  1. Choose the way in which the message is encoded in the "(3) Bit selection options" pane. Click the "+" sign to the left of the type of file that hides the message, then select the compression level.

 

  1. Click the "Unhide!" button.

 

  1. Indicate where you want the file with the hidden message to go by selecting the output directory in the "Browse for Folder" box that pops up and clicking the "OK" button.

 

  1. Click "OK" on the "Task completed - Info" dialog box that appears then click "Done" on the Task Report window that comes up. Note the name of the file that got pulled out. It will appear roughly in the middle of the report window directly to the right of where it says "Name <-".

 

  1. Close FilePuff by clicking the red button with an X the upper right corner of the "Data Unhiding" window then by clicking the close button in the upper right corner of the main FilePuff screen.

 

  1. Locate the file you decrypted and open it by double-clicking on it.

Anonymous ID: c08229 May 3, 2018, 4:18 p.m. No.1290068   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

https://incoherency.co.uk/image-steganography/#unhide

 

used tool, nothing hidden 'in plain site' so I'm not sure there's anything to anything other than maybe filenameโ€ฆ