Anonymous ID: 1925b6 May 4, 2018, 7:32 p.m. No.1303711   🗄️.is 🔗kun   >>3779 >>3848 >>3855

>>1303561

 

In the wee hours of Thursday morning we came to the knowledge that Q layers information in the photo drops that are made. That's why they are so large. The process is called STEGANOGRAPHY.

 

Suspected is that the image names lead to the password necessary to decode the data that is imbedded.

 

Those images with black frames? It's not because Q is a lousy photographer. It's because black can hold more data.

 

Someone (presumably a member of Team Q) gave a link to a website that uncodes these things.

 

https://www.mobilefish. com/services/steganography/steganography.php

 

The problem? This only accepts up to 4mg. Also, still no password.

 

Uploading one of Q's images with original file name. From Wed night/Thur morning.

 

PLEASE - head to the board 1608 if you have more questions and read the back and forth there. I'm absolute in the fact that this is a directive.

 

>>1283315 started it all

Anonymous ID: 1925b6 May 4, 2018, 7:46 p.m. No.1303917   🗄️.is 🔗kun

>>1303848

 

You know all those mispellings and weird capital letters in POTUS tweets? That's "actual cryptology."

 

I guess I'll go it alone starting Monday. Maybe since WWG1WGA, someone can wish me luck. Don't even have to post it. A mental high five will be just fine.

Anonymous ID: 1925b6 May 4, 2018, 7:54 p.m. No.1304053   🗄️.is 🔗kun

>>1303885

 

Thanks for the tip! It dawned on me to use my handy-dandy searchable database for the word steganography. There they are.

 

There's a program called stegdetect that runs on Linux. Anyone interested?

 

http://freshmeat.sourceforge.net/ projects/stegdetect