Anonymous ID: 5b8087 July 26, 2018, 4:52 p.m. No.2302893   🗄️.is 🔗kun   >>2914 >>2927 >>5165 >>1401

Codefag here, i know a easyish way to find the hidden data if there is another unshopped version of this same picture? We are looking for a needle in a haystack without out it, the best approach is to first narrow down the haystack before doing brute force

Anonymous ID: 5b8087 July 26, 2018, 7:27 p.m. No.2304792   🗄️.is 🔗kun   >>4816 >>4842 >>4966

Sorry I went for a walk with fam. anyways my issue is this, say I have a 8 bit binary, 10101010 this is the original binary, now I'm going to hide my data (a single bit) 10101011 you can clearly see the difference right? Now what if I delete the original binary, what do you have to compare it to? The other issue with the f5 algorithm is what if I randomly hid my data through out the image, and used the password to generate this randomness, how do we know they used f5 ? That's why it's easiest to find a source image to compare.

Anonymous ID: 5b8087 July 26, 2018, 7:31 p.m. No.2304842   🗄️.is 🔗kun

>>2304792

Q team knows all this, I think his message was really to tell us and they know what they're doing, you know? I love math, and cryptography and love the thought of sitting for hours trying to solve this but I have to follow logic which leads Me too the realisation that if they had even basic competence to them they could hide this data beyond my abilities to discover it fairly easy. Lol

Anonymous ID: 5b8087 July 26, 2018, 7:45 p.m. No.2305009   🗄️.is 🔗kun

>>2304966

it was a example in practice you would take the ARGB of a pixel which would be (a=0-255,R0-255,G=0-255,b=0-255) and change the LSB and then rewrite the image. I was trying to illustrate how hard it is to detect a LSB change when you view the image in a editor/image viewer without the original to compare it to.

Anonymous ID: 5b8087 July 26, 2018, 7:49 p.m. No.2305060   🗄️.is 🔗kun

See where anon pasted the hidden data sarah picture of the original they found? see the noise, static in the pasted portion? thats from file compression removing the pixels with compression, or that is evidence of the pixel colors being changed when data is hidden in them, if that makes any sense? i was trying to say that if you compare the original to the tampered photo you will beable to see a difference (either visually, or not with you eyes but by comparing the binary 0's and 1's directly)

Anonymous ID: 5b8087 July 26, 2018, 7:58 p.m. No.2305158   🗄️.is 🔗kun

for a further example, remembering that a image is made up of individual pixels and each pixel is made up of a ARGB value you can see visual what i mean about editing the LSB by going here and generating a Hex value for a color

https://www.colorhexa.com/

mine is this #221d1d (this is a black color)

then ill change it to binary for us to see

//

https://www.binaryhexconverter.com/hex-to-binary-converter

//

now here is my color

0010 0010 0001 1101 0001 1101

if i change that to this

0010 0010 0001 1101 0001 1100

go and compare that color to the original?

they arent visually different to the naked eye

Anonymous ID: 5b8087 July 26, 2018, 8:23 p.m. No.2305455   🗄️.is 🔗kun

https://desudesutalk.github.io/f5stegojs/

data extracts using July212019 as pass. Image is Q image of silverman.

nice work anon. data is encrypted i bet

Anonymous ID: 5b8087 July 26, 2018, 8:26 p.m. No.2305486   🗄️.is 🔗kun   >>5589

>>2305416

say i have your public key, you can attach it with your email. i can encrypt the password to my data i'm going to send you with your public key (using a public encryption method). so then you receive the data i sent you and i encrypted the password for that data with your public key, you can decrypt that password but no one else can because only you have your private key to combine with your public key.

Anonymous ID: 5b8087 July 26, 2018, 8:45 p.m. No.2305661   🗄️.is 🔗kun

>>2305617

"if you", * meant "if they". Anyways, Q team seems to truly have everything. its basically military vs civilian assets, how can you compete? they are light years ahead of us as far as technology. who knows what q's team has and is capable of?

Anonymous ID: 5b8087 July 26, 2018, 9:03 p.m. No.2305874   🗄️.is 🔗kun

>>2305853

 

July212019

 

thats the one i used with the password above at

https://desudesutalk.github.io/f5stegojs/ as a test used the q image too, gota data out of that with the password above

Anonymous ID: 5b8087 July 26, 2018, 9:39 p.m. No.2306366   🗄️.is 🔗kun   >>6493

>>2306258

That's the salt, not the password, it's used as part of the encryption process to add noise to the algorithm, good find though. Remember there is no such thing as a random number with a computer, that's why true crypto machine will get the noise or salt from say external sensors like current radio wave readings that are random. I'm CS we use pseudo random generators to try to make random noise with the password generators. Basically the salt plus the pass is helpful, but if it's hard coded like you said then the salt is applied with the password automatically. Make sense? I have no people skills lol fuck it.

Anonymous ID: 5b8087 July 27, 2018, 4:26 p.m. No.2317736   🗄️.is 🔗kun   >>7909

>>2311819

Similar crappy bugs to the first encryption app I put online i used the bytes of the hash of the users password and appended it to a string to feed into a password algorithm but I did this lol

Byte [] pass = new byte [stringlength];

 

Then I appended it to the string like this, string+pass.ToString () it literally appends "system.net.byte []" in c# lol anyways, where are we at with your unknot app? How can I help?

Anonymous ID: 5b8087 July 27, 2018, 6:15 p.m. No.2319101   🗄️.is 🔗kun

>>2319036

how can i anonymously post code so others can use my C# version? im writing it to drag and drop images and a word list to run against all images.

Console app, nothing fancy, linux friendly

Anonymous ID: 5b8087 July 28, 2018, 11:27 a.m. No.2326152   🗄️.is 🔗kun   >>6226

>>2325105

C#fag from yesterday here, i left my code running over night testing 2/3 Of various passes, no luck. Did you find something ? I used q images that he posted though, not silverman pic since I figured you were working on it.