Anonymous ID: d45c94 June 24, 2018, 7:49 p.m. No.1894453   🗄️.is 🔗kun

Newfag here, has anyone considered the image is the key as in steganography? Ive been thinking on this for weeks, ive thought about writing a simple app to see if i can pull any useful data out of the images by comparing q images to known duplicates from other sources. I know q says his images are all originals but i know the picture of the submarine surfaced, shortly after missle launch q post was taken from another article talking about the chinese stealing sap programs. I have the image q posted but if someone could kindly post the link to the article i could get that image and work from there. My idea for weeks has been to get the raw image (not exif data) examine the lsb of the data byte by byte and compare them 1 for one between images. If anyone is interested id like to contribute, could be a nothing burger, maybe not. First step would be to run a simple hash between the raw data, if its the same then its a no go.

J

Anonymous ID: d45c94 June 25, 2018, 12:16 a.m. No.1896617   🗄️.is 🔗kun   >>6639

>>1896547

That's my problem, to many possibilities. I'm going through and looking at letters/sentences inside the kill boxes, I'm leaning toward them all having to be aligned/fill in the missing. and then I'm leaning toward POTUS tweets giving us part of the missing key in his deliberate misspelling of words/corrections. My adhd super powers aren't doing shit tonight.

Anonymous ID: d45c94 June 25, 2018, 12:20 a.m. No.1896639   🗄️.is 🔗kun   >>6815

>>1896617

I 100% agree there is a key hidden in his posts but a key is worthless without data to decrypt. Which leads me back to data being hidden in his original images (most of which are lossless .png files). My next issue is which encryption method did he use? I only have access to civilian methods, I don't even have a clue what encryption methods the military would use, I suspect most people wouldn't either so i would stick with the civilian methods.

Anonymous ID: d45c94 June 25, 2018, 1:41 a.m. No.1896918   🗄️.is 🔗kun   >>6972

>>1896831

That's why i haven't done much with it. i only have a few hours a night to dedicate. I can write the program but i don't have time to hunt down possible key candidates =( Remember the png's of the pallets (phones?) specifically the pallet skid in the back of semi truck. I downloaded (when he posted) it and looked at just the file size and it was over 8mb. Png's aren't nearly as small as .jpg but it seemed excessive. by far the most common image file would be .jpg so i think by q selecting .png it is telling. Larger file sizes = more bytes to hide data in using stego methods. I think we can assume we have the data and focus more on how to unlock it. As noted i will focus on aes 256.