Checking in after fighting with MegaPicAnon images. I got nothing.
Couple of interesting findings. Working with Vlad the Impaler as an example. The file is already very compressed, but it's still very large. (It would be possible to give us the same image in KB instead of MB.) Image is included.
As I said, it's already compressed. If one uses a compression software on it, only about 4,000 bytes of 10.7 megabytes are saved. That's a tight file. It leads credence to the idea that there are zip files embedded which are already tight files. Also, if opened in notepad or text edit, the png returns 7 times where "zip" is used. For some reason, the compressed version of the png only returns 5.
I have tried reading with a hex editor. Indeed there are words, "busy" for one, but damned if I can makes sense of it. And I can't figure out a way to copy and paste segments to decompress like this tutorial shows. The damned hex editor goes bonkers when trying to select.
This post will draw the shills. The steganography always does. I thought today would be the day, but it's not. Not for this anon anyway.
Here's the tutorial I mentioned:
https://www.youtube.com/watch?v=KUZVIBXfoeA
Didn't embed it because there's an image attached.
Help. Q is a meany for not helping us out more. The only drop was pixelknot, and I doubt these files work there. If you want to try password options to decode, consider using the word "freedom." I have a feeling a general password might be the keystone. Hell. Maybe it's "keystone."
Oh, and another anon said that 4 at the start of the 3rd group in the file name is standard with the nomenclature of the file naming. Gave me a link earlier today and everything. There was a time a few months ago where we thought that pattern might have been important.
I'm going to go now before my bad attitude gets the better of me. I about let certain words slip through my fingers.
Come on anons. Let's get this one done.