>>147055
Sorry, what I found was a little different from what you describe. I found two IDAT chunks in the original file. I removed the second one (leaving the last 8 bytes: IEND+4) intact. Saved the file and opened it in GIMP. The text portion of the image is now replaced with black, truncating the text after the line that starts with "election …"
A specimen showing this is attached. NOTE: I have marked it MODIFIED - DO NOT USE so nobody will accidentally think this was the original file. It isn't.
I have no idea if what we are inspecting has any significance, but we should at least be able to replicate each other's methodology… and we haven't, yet.
I can think of numerous ways that a message could be concealed within an image…none of them things anyone could just stumble upon and decode without knowing the method that was used. Bit shift the data. Interpret a range of bytes within the image as a crypto key to another file. Use a crypto key provided elsewhere to decrypt this file. Add or subtract a certain value from a range of bytes. Examine a string of bytes at a specified offset (given elsewhere). Select individual bits or bytes whose locations(s) are given elsewhere. ….. ad nauseum.
UGH.